[SUSE-SU-2022:2411-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
71
CVEs
14
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
The following non-security bugs were fixed:
- exec: Force single empty string when argv is empty (bsc#1200571).
- ID
- SUSE-SU-2022:2411-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20222411-1/
- Published
-
2022-07-15T12:28:01
(2 years ago) - Modified
-
2022-07-15T12:28:01
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1571
- ALAS-2022-1624
- ALAS-2022-1636
- ALAS2-2021-1712
- ALAS2-2022-1761
- ALAS2-2022-1825
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALPINE:CVE-2022-26365
- ALPINE:CVE-2022-29900
- ALPINE:CVE-2022-33740
- ALPINE:CVE-2022-33741
- ALPINE:CVE-2022-33742
- ALSA-2022:1988
- ALSA-2022:7110
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- DSA-5173-1
- DSA-5184-1
- DSA-5191-1
- DSA-5207-1
- ELSA-2022-1988
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-8267
- ELSA-2022-9198
- ELSA-2022-9199
- ELSA-2022-9200
- ELSA-2022-9201
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9348
- ELSA-2022-9590
- ELSA-2022-9591
- ELSA-2022-9667
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12433
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-3e6ce58029
- FEDORA-2022-8aab5b5cde
- FEDORA-2022-a0d7a5eaf2
- FEDORA-2022-c4ec706488
- FEDORA-2022-c69ef9c1dd
- GLSA-202402-07
- MS:CVE-2021-4157
- MS:CVE-2022-2318
- MS:CVE-2022-29900
- MS:CVE-2022-33981
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2022:1988
- RLSA-2022:7110
- SSA:2022-237-02
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2435-1
- SUSE-SU-2022:2438-1
- SUSE-SU-2022:2443-1
- SUSE-SU-2022:2444-1
- SUSE-SU-2022:2445-1
- SUSE-SU-2022:2446-1
- SUSE-SU-2022:2460-1
- SUSE-SU-2022:2461-1
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2482-1
- SUSE-SU-2022:2515-1
- SUSE-SU-2022:2516-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2696-1
- SUSE-SU-2022:2697-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2710-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2732-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2750-1
- SUSE-SU-2022:2759-1
- SUSE-SU-2022:2762-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2779-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2781-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2808-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:3665-1
- SUSE-SU-2022:3728-1
- SUSE-SU-2022:3928-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- USN-5413-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5514-1
- USN-5517-1
- USN-5518-1
- USN-5529-1
- USN-5539-1
- USN-5540-1
- USN-5544-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5572-1
- USN-5572-2
- USN-5579-1
- USN-5582-1
- USN-5623-1
- USN-5624-1
- USN-5633-1
- USN-5635-1
- USN-5640-1
- USN-5644-1
- USN-5648-1
- USN-5655-1
- USN-5668-1
- USN-5669-1
- USN-5669-2
- USN-5677-1
- USN-5678-1
- USN-5679-1
- USN-5682-1
- USN-5683-1
- USN-5684-1
- USN-5687-1
- USN-5693-1
- USN-5695-1
- USN-5706-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5773-1
- USN-5789-1
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- VMSA-2022-0020.2
- XSA-403
- XSA-407
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.117.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.117.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.117.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-zfcpdump-man | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.3 | suse | kernel-zfcpdump-man | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.3 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.3 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.3 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.3 | suse | kernel-vanilla | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.3 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.3 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.3 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.3 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.3 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.3 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.3 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.3 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.3 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.3 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.3 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.3 | suse | kernel-vanilla-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | aarch64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.117.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.117.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.117.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=1 | suse | kernel-source | < 4.12.14-150100.197.117.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.117.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.117.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.117.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=1 | suse | kernel-macros | < 4.12.14-150100.197.117.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-kvmsmall-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.3 | suse | kernel-kvmsmall-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | x86_64 | |
Affected | pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=1 | suse | kernel-docs | < 4.12.14-150100.197.117.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=1 | suse | kernel-devel | < 4.12.14-150100.197.117.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.117.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.117.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.117.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default-man | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-default-man | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.3 | suse | kernel-default-man | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.117.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.117.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.117.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.117.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.117.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.117.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.117.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-debug-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.3 | suse | kernel-debug-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | x86_64 | |
Affected | pkg:rpm/suse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-debug-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.3 | suse | kernel-debug-base | < 4.12.14-150100.197.117.1 | opensuse-leap-15.3 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |