{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\nThe SUSE Linux Enterprise 15 SP3 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198028)\n- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)\n- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).\n- CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a local attacker with a user privilege to execute a denial of service. (bsc#1198029)\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)\n- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)\n- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)\n- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)\n- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix return value of __setup handlers (git-fixes).\n- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).\n- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).\n- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).\n- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).\n- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).\n- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).\n- ACPI: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).\n- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).\n- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).\n- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).\n- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).\n- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).\n- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).\n- ALSA: spi: Add check for clk_enable() (git-fixes).\n- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).\n- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).\n- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).\n- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).\n- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).\n- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).\n- ASoC: fsi: Add check for clk_enable (git-fixes).\n- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).\n- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).\n- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).\n- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).\n- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).\n- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).\n- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).\n- ASoC: SOF: topology: remove redundant code (git-fixes).\n- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).\n- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).\n- ASoC: topology: Allow TLV control to be either read or write (git-fixes).\n- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).\n- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).\n- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).\n- block: update io_ticks when io hang (bsc#1197817).\n- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).\n- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).\n- bpf: Remove config check to enable bpf support for branch records (git-fixes bsc#1177028).\n- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1194649).\n- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1194649).\n- btrfs: avoid unnecessary logging of xattrs during fast fsyncs (bsc#1194649).\n- btrfs: check error value from btrfs_update_inode in tree log (bsc#1194649).\n- btrfs: check if a log root exists before locking the log_mutex on unlink (bsc#1194649).\n- btrfs: check if a log tree exists at inode_logged() (bsc#1194649).\n- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1194649).\n- btrfs: do not log new dentries when logging that a new name exists (bsc#1194649).\n- btrfs: eliminate some false positives when checking if inode was logged (bsc#1194649).\n- btrfs: fix race leading to unnecessary transaction commit when logging inode (bsc#1194649).\n- btrfs: fix race that causes unnecessary logging of ancestor inodes (bsc#1194649).\n- btrfs: fix race that makes inode logging fallback to transaction commit (bsc#1194649).\n- btrfs: fix race that results in logging old extents during a fast fsync (bsc#1194649).\n- btrfs: fixup error handling in fixup_inode_link_counts (bsc#1194649).\n- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1194649).\n- btrfs: Remove unnecessary check from join_running_log_trans (bsc#1194649).\n- btrfs: remove unnecessary directory inode item update when deleting dir entry (bsc#1194649).\n- btrfs: remove unnecessary list head initialization when syncing log (bsc#1194649).\n- btrfs: skip unnecessary searches for xattrs when logging an inode (bsc#1194649).\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).\n- can: mcba_usb: properly check endpoint type (git-fixes).\n- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).\n- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: bcm2835: Remove unused variable (git-fixes).\n- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).\n- clk: Initialize orphan req_rate (git-fixes).\n- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: nxp: Remove unused variable (git-fixes).\n- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).\n- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).\n- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).\n- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).\n- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).\n- clk: uniphier: Fix fixed-rate initialization (git-fixes).\n- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).\n- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).\n- cpufreq: schedutil: Destroy mutex before kobject_put() frees (git-fixes)\n- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).\n- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).\n- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).\n- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).\n- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).\n- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).\n- crypto: vmx - add missing dependencies (git-fixes).\n- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).\n- driver core: dd: fix return value of __setup handler (git-fixes).\n- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).\n- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).\n- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).\n- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).\n- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).\n- drm/doc: overview before functions for drm_writeback.c (git-fixes).\n- drm/i915: Fix dbuf slice config lookup (git-fixes).\n- drm/i915/gem: add missing boundary check in vm_access (git-fixes).\n- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).\n- drm/meson: Fix error handling when afbcd.ops->init fails (git-fixes).\n- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).\n- drm/msm/dpu: add DSPP blocks teardown (git-fixes).\n- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).\n- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).\n- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).\n- drm/vc4: crtc: Make sure the HDMI controller is powered when disabling (git-fixes).\n- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).\n- ecryptfs: fix kernel panic with null dev_name (bsc#1197812).\n- ecryptfs: Fix typo in message (bsc#1197811).\n- ext2: correct max file size computing (bsc#1197820).\n- firmware: google: Properly state IOMEM dependency (git-fixes).\n- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).\n- fscrypt: do not ignore minor_hash when hash is 0 (bsc#1197815).\n- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).\n- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).\n- hwmon: (pmbus) Add Vin unit off handling (git-fixes).\n- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).\n- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).\n- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).\n- iio: adc: Add check for devm_request_threaded_irq (git-fixes).\n- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).\n- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).\n- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).\n- iio: inkern: make a best effort on offset calculation (git-fixes).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- iwlwifi: do not advertise TWT support (git-fixes).\n- KVM: SVM: Do not flush cache if hardware enforces cache coherency across encryption domains (bsc#1178134).\n- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).\n- mac80211: fix potential double free on mesh join (git-fixes).\n- mac80211: refuse aggregations sessions before authorized (git-fixes).\n- media: aspeed: Correct value for h-total-pixels (git-fixes).\n- media: bttv: fix WARNING regression on tunerless devices (git-fixes).\n- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).\n- media: em28xx: initialize refcount before kref_get (git-fixes).\n- media: hantro: Fix overfill bottom register field name (git-fixes).\n- media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes).\n- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).\n- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).\n- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).\n- membarrier: Execute SYNC_CORE on the calling thread (git-fixes)\n- membarrier: Explicitly sync remote cores when SYNC_CORE is (git-fixes)\n- memory: emif: Add check for setup_interrupts (git-fixes).\n- memory: emif: check the pointer temp in get_device_details() (git-fixes).\n- misc: alcor_pci: Fix an error handling path (git-fixes).\n- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).\n- mm_zone: add function to check if managed dma zone exists (bsc#1197501).\n- mm: add vma_lookup(), update find_vma_intersection() comments (git-fixes).\n- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).\n- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).\n- net: dsa: mv88e6xxx: override existent unicast portvec in port_fdb_add (git-fixes).\n- net: enetc: initialize the RFS and RSS memories (git-fixes).\n- net: hns3: add a check for tqp_index in hclge_get_ring_chain_from_mbx() (git-fixes).\n- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).\n- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).\n- net: stmmac: set TxQ mode back to DCB after disabling CBS (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).\n- net: watchdog: hold device global xmit lock during tx disable (git-fixes).\n- net/smc: Fix loop in smc_listen (git-fixes).\n- net/smc: fix using of uninitialized completions (git-fixes).\n- net/smc: fix wrong list_del in smc_lgr_cleanup_early (git-fixes).\n- net/smc: Make sure the link_id is unique (git-fixes).\n- net/smc: Reset conn->lgr when link group registration fails (git-fixes).\n- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).\n- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).\n- NFS: Fix another issue with a list iterator pointing to the head (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFS: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).\n- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).\n- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).\n- pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes).\n- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).\n- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).\n- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).\n- pinctrl: samsung: drop pin banks references on error paths (git-fixes).\n- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).\n- PM: hibernate: fix __setup handler error handling (git-fixes).\n- PM: suspend: fix return value of __setup handler (git-fixes).\n- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).\n- powerpc/mm: Fix verification of MMU_FTR_TYPE_44x (bsc#1156395).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).\n- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).\n- powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299).\n- powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc#1198077 ltc#197299).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).\n- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).\n- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).\n- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).\n- s390/bpf: Perform r1 range checking before accessing jit->seen_reg (git-fixes).\n- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).\n- s390/gmap: validate VMA in __gmap_zap() (git-fixes).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195640 LTC#196352).\n- s390/kexec_file: fix error handling when applying relocations (git-fixes).\n- s390/kexec: fix memory leak of ipl report buffer (git-fixes).\n- s390/kexec: fix return code handling (git-fixes).\n- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).\n- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/pci_mmio: fully validate the VMA before calling follow_pte() (git-fixes).\n- s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC#197378).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).\n- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).\n- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).\n- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).\n- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).\n- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).\n- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).\n- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).\n- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n- team: protect features update by RCU to avoid deadlock (git-fixes).\n- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).\n- thermal: int340x: Increase bitmap size (git-fixes).\n- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).\n- usb: bdc: Adb shows offline after resuming from S2 (git-fixes).\n- usb: bdc: Fix a resource leak in the error handling path of 'bdc_probe()' (git-fixes).\n- usb: bdc: Fix unused assignment in bdc_probe() (git-fixes).\n- usb: bdc: remove duplicated error message (git-fixes).\n- usb: bdc: Use devm_clk_get_optional() (git-fixes).\n- usb: bdc: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: gadget: Use list_replace_init() before traversing lists (git-fixes).\n- usb: dwc3: qcom: add IRQ check (git-fixes).\n- usb: gadget: bdc: use readl_poll_timeout() to simplify code (git-fixes).\n- usb: gadget: Fix use-after-free bug by not setting udc->dev.driver (git-fixes).\n- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).\n- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).\n- VFS: filename_create(): fix incorrect intent (bsc#1197534).\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).\n- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).\n- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).\n- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).\n- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).\n- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).\n- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).\n- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).\n- x86/cpu: Add hardware-enforced cache coherency as a CPUID feature (bsc#1178134).\n- x86/mm/pat: Do not flush cache if hardware enforces cache coherency across encryption domnains (bsc#1178134).\n- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1178134).\n- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1178134).\n- xhci: fix garbage USBSTS being logged in some cases (git-fixes).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2022-1407,SUSE-SLE-Module-RT-15-SP3-2022-1407,SUSE-SUSE-MicroOS-5.1-2022-1407,SUSE-SUSE-MicroOS-5.2-2022-1407","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1407-1.json"},{"category":"self","summary":"URL for SUSE-SU-2022:1407-1","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20221407-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2022:1407-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html"},{"category":"self","summary":"SUSE Bug 1065729","url":"https://bugzilla.suse.com/1065729"},{"category":"self","summary":"SUSE Bug 1156395","url":"https://bugzilla.suse.com/1156395"},{"category":"self","summary":"SUSE Bug 1175667","url":"https://bugzilla.suse.com/1175667"},{"category":"self","summary":"SUSE Bug 1177028","url":"https://bugzilla.suse.com/1177028"},{"category":"self","summary":"SUSE Bug 1178134","url":"https://bugzilla.suse.com/1178134"},{"category":"self","summary":"SUSE Bug 1179639","url":"https://bugzilla.suse.com/1179639"},{"category":"self","summary":"SUSE Bug 1180153","url":"https://bugzilla.suse.com/1180153"},{"category":"self","summary":"SUSE Bug 1189562","url":"https://bugzilla.suse.com/1189562"},{"category":"self","summary":"SUSE Bug 1194625","url":"https://bugzilla.suse.com/1194625"},{"category":"self","summary":"SUSE Bug 1194649","url":"https://bugzilla.suse.com/1194649"},{"category":"self","summary":"SUSE Bug 1195640","url":"https://bugzilla.suse.com/1195640"},{"category":"self","summary":"SUSE Bug 1195926","url":"https://bugzilla.suse.com/1195926"},{"category":"self","summary":"SUSE Bug 1196018","url":"https://bugzilla.suse.com/1196018"},{"category":"self","summary":"SUSE Bug 1196196","url":"https://bugzilla.suse.com/1196196"},{"category":"self","summary":"SUSE Bug 1196478","url":"https://bugzilla.suse.com/1196478"},{"category":"self","summary":"SUSE Bug 1196761","url":"https://bugzilla.suse.com/1196761"},{"category":"self","summary":"SUSE Bug 1196823","url":"https://bugzilla.suse.com/1196823"},{"category":"self","summary":"SUSE Bug 1197227","url":"https://bugzilla.suse.com/1197227"},{"category":"self","summary":"SUSE Bug 1197243","url":"https://bugzilla.suse.com/1197243"},{"category":"self","summary":"SUSE Bug 1197300","url":"https://bugzilla.suse.com/1197300"},{"category":"self","summary":"SUSE Bug 1197302","url":"https://bugzilla.suse.com/1197302"},{"category":"self","summary":"SUSE Bug 1197331","url":"https://bugzilla.suse.com/1197331"},{"category":"self","summary":"SUSE Bug 1197343","url":"https://bugzilla.suse.com/1197343"},{"category":"self","summary":"SUSE Bug 1197366","url":"https://bugzilla.suse.com/1197366"},{"category":"self","summary":"SUSE Bug 1197389","url":"https://bugzilla.suse.com/1197389"},{"category":"self","summary":"SUSE Bug 1197462","url":"https://bugzilla.suse.com/1197462"},{"category":"self","summary":"SUSE Bug 1197501","url":"https://bugzilla.suse.com/1197501"},{"category":"self","summary":"SUSE Bug 1197534","url":"https://bugzilla.suse.com/1197534"},{"category":"self","summary":"SUSE Bug 1197661","url":"https://bugzilla.suse.com/1197661"},{"category":"self","summary":"SUSE Bug 1197675","url":"https://bugzilla.suse.com/1197675"},{"category":"self","summary":"SUSE Bug 1197677","url":"https://bugzilla.suse.com/1197677"},{"category":"self","summary":"SUSE Bug 1197702","url":"https://bugzilla.suse.com/1197702"},{"category":"self","summary":"SUSE Bug 1197811","url":"https://bugzilla.suse.com/1197811"},{"category":"self","summary":"SUSE Bug 1197812","url":"https://bugzilla.suse.com/1197812"},{"category":"self","summary":"SUSE Bug 1197815","url":"https://bugzilla.suse.com/1197815"},{"category":"self","summary":"SUSE Bug 1197817","url":"https://bugzilla.suse.com/1197817"},{"category":"self","summary":"SUSE Bug 1197819","url":"https://bugzilla.suse.com/1197819"},{"category":"self","summary":"SUSE Bug 1197820","url":"https://bugzilla.suse.com/1197820"},{"category":"self","summary":"SUSE Bug 1197888","url":"https://bugzilla.suse.com/1197888"},{"category":"self","summary":"SUSE Bug 1197889","url":"https://bugzilla.suse.com/1197889"},{"category":"self","summary":"SUSE Bug 1197894","url":"https://bugzilla.suse.com/1197894"},{"category":"self","summary":"SUSE Bug 1198027","url":"https://bugzilla.suse.com/1198027"},{"category":"self","summary":"SUSE Bug 1198028","url":"https://bugzilla.suse.com/1198028"},{"category":"self","summary":"SUSE Bug 1198029","url":"https://bugzilla.suse.com/1198029"},{"category":"self","summary":"SUSE Bug 1198030","url":"https://bugzilla.suse.com/1198030"},{"category":"self","summary":"SUSE Bug 1198031","url":"https://bugzilla.suse.com/1198031"},{"category":"self","summary":"SUSE Bug 1198032","url":"https://bugzilla.suse.com/1198032"},{"category":"self","summary":"SUSE Bug 1198033","url":"https://bugzilla.suse.com/1198033"},{"category":"self","summary":"SUSE Bug 1198077","url":"https://bugzilla.suse.com/1198077"},{"category":"self","summary":"SUSE CVE CVE-2021-45868 page","url":"https://www.suse.com/security/cve/CVE-2021-45868/"},{"category":"self","summary":"SUSE CVE CVE-2022-0850 page","url":"https://www.suse.com/security/cve/CVE-2022-0850/"},{"category":"self","summary":"SUSE CVE CVE-2022-0854 page","url":"https://www.suse.com/security/cve/CVE-2022-0854/"},{"category":"self","summary":"SUSE CVE CVE-2022-1011 page","url":"https://www.suse.com/security/cve/CVE-2022-1011/"},{"category":"self","summary":"SUSE CVE CVE-2022-1016 page","url":"https://www.suse.com/security/cve/CVE-2022-1016/"},{"category":"self","summary":"SUSE CVE CVE-2022-1048 page","url":"https://www.suse.com/security/cve/CVE-2022-1048/"},{"category":"self","summary":"SUSE CVE CVE-2022-1055 page","url":"https://www.suse.com/security/cve/CVE-2022-1055/"},{"category":"self","summary":"SUSE CVE CVE-2022-1195 page","url":"https://www.suse.com/security/cve/CVE-2022-1195/"},{"category":"self","summary":"SUSE CVE CVE-2022-1198 page","url":"https://www.suse.com/security/cve/CVE-2022-1198/"},{"category":"self","summary":"SUSE CVE CVE-2022-1199 page","url":"https://www.suse.com/security/cve/CVE-2022-1199/"},{"category":"self","summary":"SUSE CVE CVE-2022-1205 page","url":"https://www.suse.com/security/cve/CVE-2022-1205/"},{"category":"self","summary":"SUSE CVE CVE-2022-27666 page","url":"https://www.suse.com/security/cve/CVE-2022-27666/"},{"category":"self","summary":"SUSE CVE CVE-2022-28388 page","url":"https://www.suse.com/security/cve/CVE-2022-28388/"},{"category":"self","summary":"SUSE CVE CVE-2022-28389 page","url":"https://www.suse.com/security/cve/CVE-2022-28389/"},{"category":"self","summary":"SUSE CVE CVE-2022-28390 page","url":"https://www.suse.com/security/cve/CVE-2022-28390/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2022-04-26T09:19:06Z","generator":{"date":"2022-04-26T09:19:06Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2022:1407-1","initial_release_date":"2022-04-26T09:19:06Z","revision_history":[{"date":"2022-04-26T09:19:06Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-devel-rt-5.3.18-150300.85.1.noarch","product":{"name":"kernel-devel-rt-5.3.18-150300.85.1.noarch","product_id":"kernel-devel-rt-5.3.18-150300.85.1.noarch"}},{"category":"product_version","name":"kernel-source-rt-5.3.18-150300.85.1.noarch","product":{"name":"kernel-source-rt-5.3.18-150300.85.1.noarch","product_id":"kernel-source-rt-5.3.18-150300.85.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","product":{"name":"cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","product_id":"cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"cluster-md-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"cluster-md-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"cluster-md-kmp-rt_debug-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"dlm-kmp-rt-5.3.18-150300.85.1.x86_64","product":{"name":"dlm-kmp-rt-5.3.18-150300.85.1.x86_64","product_id":"dlm-kmp-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"dlm-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"dlm-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"dlm-kmp-rt_debug-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","product":{"name":"gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","product_id":"gfs2-kmp-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"gfs2-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"gfs2-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"gfs2-kmp-rt_debug-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt-devel-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt-devel-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt-devel-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt-extra-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt-extra-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt-extra-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt-livepatch-devel-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt-livepatch-devel-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt-livepatch-devel-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt-optional-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt-optional-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt-optional-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt_debug-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-extra-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt_debug-extra-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt_debug-extra-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-livepatch-devel-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt_debug-livepatch-devel-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt_debug-livepatch-devel-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-rt_debug-optional-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-rt_debug-optional-5.3.18-150300.85.1.x86_64","product_id":"kernel-rt_debug-optional-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kernel-syms-rt-5.3.18-150300.85.1.x86_64","product":{"name":"kernel-syms-rt-5.3.18-150300.85.1.x86_64","product_id":"kernel-syms-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kselftests-kmp-rt-5.3.18-150300.85.1.x86_64","product":{"name":"kselftests-kmp-rt-5.3.18-150300.85.1.x86_64","product_id":"kselftests-kmp-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"kselftests-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"kselftests-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"kselftests-kmp-rt_debug-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64","product":{"name":"ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64","product_id":"ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"ocfs2-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"ocfs2-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"ocfs2-kmp-rt_debug-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"reiserfs-kmp-rt-5.3.18-150300.85.1.x86_64","product":{"name":"reiserfs-kmp-rt-5.3.18-150300.85.1.x86_64","product_id":"reiserfs-kmp-rt-5.3.18-150300.85.1.x86_64"}},{"category":"product_version","name":"reiserfs-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product":{"name":"reiserfs-kmp-rt_debug-5.3.18-150300.85.1.x86_64","product_id":"reiserfs-kmp-rt_debug-5.3.18-150300.85.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Real Time Module 15 SP3","product":{"name":"SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-module-rt:15:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.1","product":{"name":"SUSE Linux Enterprise Micro 5.1","product_id":"SUSE Linux Enterprise Micro 5.1","product_identification_helper":{"cpe":"cpe:/o:suse:suse-microos:5.1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.2","product":{"name":"SUSE Linux Enterprise Micro 5.2","product_id":"SUSE Linux Enterprise Micro 5.2","product_identification_helper":{"cpe":"cpe:/o:suse:suse-microos:5.2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"dlm-kmp-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"dlm-kmp-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"gfs2-kmp-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-rt-5.3.18-150300.85.1.noarch as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch"},"product_reference":"kernel-devel-rt-5.3.18-150300.85.1.noarch","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"kernel-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-devel-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64"},"product_reference":"kernel-rt-devel-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64"},"product_reference":"kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-rt-5.3.18-150300.85.1.noarch as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch"},"product_reference":"kernel-source-rt-5.3.18-150300.85.1.noarch","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"kernel-syms-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Real Time Module 15 SP3","product_id":"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Real Time Module 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1","product_id":"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"kernel-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.1"},{"category":"default_component_of","full_product_name":{"name":"kernel-rt-5.3.18-150300.85.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2","product_id":"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64"},"product_reference":"kernel-rt-5.3.18-150300.85.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.2"}]},"vulnerabilities":[{"cve":"CVE-2021-45868","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-45868"}],"notes":[{"category":"general","text":"In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-45868","url":"https://www.suse.com/security/cve/CVE-2021-45868"},{"category":"external","summary":"SUSE Bug 1197366 for CVE-2021-45868","url":"https://bugzilla.suse.com/1197366"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2021-45868"},{"cve":"CVE-2022-0850","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-0850"}],"notes":[{"category":"general","text":"A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-0850","url":"https://www.suse.com/security/cve/CVE-2022-0850"},{"category":"external","summary":"SUSE Bug 1196761 for CVE-2022-0850","url":"https://bugzilla.suse.com/1196761"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-0850"},{"cve":"CVE-2022-0854","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-0854"}],"notes":[{"category":"general","text":"A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-0854","url":"https://www.suse.com/security/cve/CVE-2022-0854"},{"category":"external","summary":"SUSE Bug 1196823 for CVE-2022-0854","url":"https://bugzilla.suse.com/1196823"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-0854"},{"cve":"CVE-2022-1011","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1011"}],"notes":[{"category":"general","text":"A use-after-free flaw was found in the Linux kernel's FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1011","url":"https://www.suse.com/security/cve/CVE-2022-1011"},{"category":"external","summary":"SUSE Bug 1197343 for CVE-2022-1011","url":"https://bugzilla.suse.com/1197343"},{"category":"external","summary":"SUSE Bug 1197344 for CVE-2022-1011","url":"https://bugzilla.suse.com/1197344"},{"category":"external","summary":"SUSE Bug 1198687 for CVE-2022-1011","url":"https://bugzilla.suse.com/1198687"},{"category":"external","summary":"SUSE Bug 1204132 for CVE-2022-1011","url":"https://bugzilla.suse.com/1204132"},{"category":"external","summary":"SUSE Bug 1212322 for CVE-2022-1011","url":"https://bugzilla.suse.com/1212322"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"important"}],"title":"CVE-2022-1011"},{"cve":"CVE-2022-1016","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1016"}],"notes":[{"category":"general","text":"A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1016","url":"https://www.suse.com/security/cve/CVE-2022-1016"},{"category":"external","summary":"SUSE Bug 1197227 for CVE-2022-1016","url":"https://bugzilla.suse.com/1197227"},{"category":"external","summary":"SUSE Bug 1197335 for CVE-2022-1016","url":"https://bugzilla.suse.com/1197335"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-1016"},{"cve":"CVE-2022-1048","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1048"}],"notes":[{"category":"general","text":"A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1048","url":"https://www.suse.com/security/cve/CVE-2022-1048"},{"category":"external","summary":"SUSE Bug 1197331 for CVE-2022-1048","url":"https://bugzilla.suse.com/1197331"},{"category":"external","summary":"SUSE Bug 1197597 for CVE-2022-1048","url":"https://bugzilla.suse.com/1197597"},{"category":"external","summary":"SUSE Bug 1200041 for CVE-2022-1048","url":"https://bugzilla.suse.com/1200041"},{"category":"external","summary":"SUSE Bug 1204132 for CVE-2022-1048","url":"https://bugzilla.suse.com/1204132"},{"category":"external","summary":"SUSE Bug 1212325 for CVE-2022-1048","url":"https://bugzilla.suse.com/1212325"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.4,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"important"}],"title":"CVE-2022-1048"},{"cve":"CVE-2022-1055","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1055"}],"notes":[{"category":"general","text":"A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1055","url":"https://www.suse.com/security/cve/CVE-2022-1055"},{"category":"external","summary":"SUSE Bug 1197702 for CVE-2022-1055","url":"https://bugzilla.suse.com/1197702"},{"category":"external","summary":"SUSE Bug 1197705 for CVE-2022-1055","url":"https://bugzilla.suse.com/1197705"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.4,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"important"}],"title":"CVE-2022-1055"},{"cve":"CVE-2022-1195","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1195"}],"notes":[{"category":"general","text":"A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1195","url":"https://www.suse.com/security/cve/CVE-2022-1195"},{"category":"external","summary":"SUSE Bug 1198029 for CVE-2022-1195","url":"https://bugzilla.suse.com/1198029"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-1195"},{"cve":"CVE-2022-1198","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1198"}],"notes":[{"category":"general","text":"A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1198","url":"https://www.suse.com/security/cve/CVE-2022-1198"},{"category":"external","summary":"SUSE Bug 1198030 for CVE-2022-1198","url":"https://bugzilla.suse.com/1198030"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-1198"},{"cve":"CVE-2022-1199","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1199"}],"notes":[{"category":"general","text":"A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1199","url":"https://www.suse.com/security/cve/CVE-2022-1199"},{"category":"external","summary":"SUSE Bug 1198028 for CVE-2022-1199","url":"https://bugzilla.suse.com/1198028"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-1199"},{"cve":"CVE-2022-1205","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-1205"}],"notes":[{"category":"general","text":"A NULL pointer dereference flaw was found in the Linux kernel's Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-1205","url":"https://www.suse.com/security/cve/CVE-2022-1205"},{"category":"external","summary":"SUSE Bug 1198027 for CVE-2022-1205","url":"https://bugzilla.suse.com/1198027"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-1205"},{"cve":"CVE-2022-27666","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-27666"}],"notes":[{"category":"general","text":"A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-27666","url":"https://www.suse.com/security/cve/CVE-2022-27666"},{"category":"external","summary":"SUSE Bug 1197131 for CVE-2022-27666","url":"https://bugzilla.suse.com/1197131"},{"category":"external","summary":"SUSE Bug 1197133 for CVE-2022-27666","url":"https://bugzilla.suse.com/1197133"},{"category":"external","summary":"SUSE Bug 1197462 for CVE-2022-27666","url":"https://bugzilla.suse.com/1197462"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"important"}],"title":"CVE-2022-27666"},{"cve":"CVE-2022-28388","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-28388"}],"notes":[{"category":"general","text":"usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-28388","url":"https://www.suse.com/security/cve/CVE-2022-28388"},{"category":"external","summary":"SUSE Bug 1198032 for CVE-2022-28388","url":"https://bugzilla.suse.com/1198032"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"moderate"}],"title":"CVE-2022-28388"},{"cve":"CVE-2022-28389","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-28389"}],"notes":[{"category":"general","text":"mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-28389","url":"https://www.suse.com/security/cve/CVE-2022-28389"},{"category":"external","summary":"SUSE Bug 1198033 for CVE-2022-28389","url":"https://bugzilla.suse.com/1198033"},{"category":"external","summary":"SUSE Bug 1201657 for CVE-2022-28389","url":"https://bugzilla.suse.com/1201657"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"important"}],"title":"CVE-2022-28389"},{"cve":"CVE-2022-28390","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-28390"}],"notes":[{"category":"general","text":"ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-28390","url":"https://www.suse.com/security/cve/CVE-2022-28390"},{"category":"external","summary":"SUSE Bug 1198031 for CVE-2022-28390","url":"https://bugzilla.suse.com/1198031"},{"category":"external","summary":"SUSE Bug 1201517 for CVE-2022-28390","url":"https://bugzilla.suse.com/1201517"},{"category":"external","summary":"SUSE Bug 1207969 for CVE-2022-28390","url":"https://bugzilla.suse.com/1207969"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.85.1.noarch","SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.85.1.x86_64","SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.85.1.x86_64"]}],"threats":[{"category":"impact","date":"2022-04-26T09:19:06Z","details":"important"}],"title":"CVE-2022-28390"}]}