<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:0289-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-02-02T09:02:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-02-02T09:02:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-02-02T09:02:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-4083: Fixed race condition in Unix domain socket garbage collection that could lead to read memory after free (bsc#1193727).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4149: Fixed improper lock operation in btrfs that allowed users to crash the kernel or deadlock the system (bsc#1194001).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4202: Fixed race condition in nci_request() that could cause use-after-free (bsc#1194529).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses (bsc#1194094).
- CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087).
- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).

The following non-security bugs were fixed:

- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- kabi/severities: Add a kabi exception for drivers/tee/tee
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901).
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209, bsc#1193660).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2022-289,SUSE-SLE-Module-RT-15-SP2-2022-289,SUSE-SUSE-MicroOS-5.0-2022-289</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      <Description>Link for SUSE-SU-2022:0289-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:0289-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1071995</URL>
      <Description>SUSE Bug 1071995</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184209</URL>
      <Description>SUSE Bug 1184209</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191271</URL>
      <Description>SUSE Bug 1191271</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193255</URL>
      <Description>SUSE Bug 1193255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193660</URL>
      <Description>SUSE Bug 1193660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193669</URL>
      <Description>SUSE Bug 1193669</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193727</URL>
      <Description>SUSE Bug 1193727</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193767</URL>
      <Description>SUSE Bug 1193767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193901</URL>
      <Description>SUSE Bug 1193901</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193927</URL>
      <Description>SUSE Bug 1193927</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194001</URL>
      <Description>SUSE Bug 1194001</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194087</URL>
      <Description>SUSE Bug 1194087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194094</URL>
      <Description>SUSE Bug 1194094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194302</URL>
      <Description>SUSE Bug 1194302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194516</URL>
      <Description>SUSE Bug 1194516</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194517</URL>
      <Description>SUSE Bug 1194517</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194529</URL>
      <Description>SUSE Bug 1194529</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194888</URL>
      <Description>SUSE Bug 1194888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194985</URL>
      <Description>SUSE Bug 1194985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4083/</URL>
      <Description>SUSE CVE CVE-2021-4083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4135/</URL>
      <Description>SUSE CVE CVE-2021-4135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4149/</URL>
      <Description>SUSE CVE CVE-2021-4149 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4197/</URL>
      <Description>SUSE CVE CVE-2021-4197 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4202/</URL>
      <Description>SUSE CVE CVE-2021-4202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-44733/</URL>
      <Description>SUSE CVE CVE-2021-44733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-45485/</URL>
      <Description>SUSE CVE CVE-2021-45485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-45486/</URL>
      <Description>SUSE CVE CVE-2021-45486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0185/</URL>
      <Description>SUSE CVE CVE-2022-0185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0322/</URL>
      <Description>SUSE CVE CVE-2022-0322 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.0">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.0" CPE="cpe:/o:suse:suse-microos:5.0">SUSE Linux Enterprise Micro 5.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Real Time Module 15 SP2">
      <Branch Type="Product Name" Name="SUSE Real Time Module 15 SP2">
        <FullProductName ProductID="SUSE Real Time Module 15 SP2" CPE="cpe:/o:suse:sle-module-rt:15:sp2">SUSE Real Time Module 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.3.18-68.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.3.18-68.1">cluster-md-kmp-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="cluster-md-kmp-rt_debug-5.3.18-68.1">cluster-md-kmp-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.3.18-68.1">
      <FullProductName ProductID="dlm-kmp-rt-5.3.18-68.1">dlm-kmp-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="dlm-kmp-rt_debug-5.3.18-68.1">dlm-kmp-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.3.18-68.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.3.18-68.1">gfs2-kmp-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="gfs2-kmp-rt_debug-5.3.18-68.1">gfs2-kmp-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.3.18-68.1">
      <FullProductName ProductID="kernel-devel-rt-5.3.18-68.1">kernel-devel-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt-5.3.18-68.1">kernel-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt-devel-5.3.18-68.1">kernel-rt-devel-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt-extra-5.3.18-68.1">kernel-rt-extra-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.3.18-68.1">kernel-rt-livepatch-devel-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt_debug-5.3.18-68.1">kernel-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.3.18-68.1">kernel-rt_debug-devel-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-extra-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt_debug-extra-5.3.18-68.1">kernel-rt_debug-extra-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-livepatch-devel-5.3.18-68.1">
      <FullProductName ProductID="kernel-rt_debug-livepatch-devel-5.3.18-68.1">kernel-rt_debug-livepatch-devel-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.3.18-68.1">
      <FullProductName ProductID="kernel-source-rt-5.3.18-68.1">kernel-source-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-rt-5.3.18-68.1">
      <FullProductName ProductID="kernel-syms-rt-5.3.18-68.1">kernel-syms-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.3.18-68.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.3.18-68.1">kselftests-kmp-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="kselftests-kmp-rt_debug-5.3.18-68.1">kselftests-kmp-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.3.18-68.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.3.18-68.1">ocfs2-kmp-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="ocfs2-kmp-rt_debug-5.3.18-68.1">ocfs2-kmp-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.3.18-68.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.3.18-68.1">reiserfs-kmp-rt-5.3.18-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt_debug-5.3.18-68.1">
      <FullProductName ProductID="reiserfs-kmp-rt_debug-5.3.18-68.1">reiserfs-kmp-rt_debug-5.3.18-68.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.0">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1">kernel-rt-5.3.18-68.1 as a component of SUSE Linux Enterprise Micro 5.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cluster-md-kmp-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1">cluster-md-kmp-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dlm-kmp-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1">dlm-kmp-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="gfs2-kmp-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1">gfs2-kmp-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-devel-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1">kernel-devel-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1">kernel-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-devel-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1">kernel-rt-devel-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1">kernel-rt_debug-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt_debug-devel-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1">kernel-rt_debug-devel-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1">kernel-source-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-syms-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1">kernel-syms-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ocfs2-kmp-rt-5.3.18-68.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Real Time Module 15 SP2">
      <FullProductName ProductID="SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1">ocfs2-kmp-rt-5.3.18-68.1 as a component of SUSE Real Time Module 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.</Note>
    </Notes>
    <CVE>CVE-2021-4083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4083.html</URL>
        <Description>CVE-2021-4083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193727</URL>
        <Description>SUSE Bug 1193727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194460</URL>
        <Description>SUSE Bug 1194460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196722</URL>
        <Description>SUSE Bug 1196722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.</Note>
    </Notes>
    <CVE>CVE-2021-4135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4135.html</URL>
        <Description>CVE-2021-4135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193927</URL>
        <Description>SUSE Bug 1193927</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.</Note>
    </Notes>
    <CVE>CVE-2021-4149</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4149.html</URL>
        <Description>CVE-2021-4149</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194001</URL>
        <Description>SUSE Bug 1194001</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2021-4197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4197.html</URL>
        <Description>CVE-2021-4197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194302</URL>
        <Description>SUSE Bug 1194302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.</Note>
    </Notes>
    <CVE>CVE-2021-4202</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4202.html</URL>
        <Description>CVE-2021-4202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194529</URL>
        <Description>SUSE Bug 1194529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194533</URL>
        <Description>SUSE Bug 1194533</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.</Note>
    </Notes>
    <CVE>CVE-2021-44733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-44733.html</URL>
        <Description>CVE-2021-44733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193767</URL>
        <Description>SUSE Bug 1193767</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.</Note>
    </Notes>
    <CVE>CVE-2021-45485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-45485.html</URL>
        <Description>CVE-2021-45485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194094</URL>
        <Description>SUSE Bug 1194094</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.</Note>
    </Notes>
    <CVE>CVE-2021-45486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-45486.html</URL>
        <Description>CVE-2021-45486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194087</URL>
        <Description>SUSE Bug 1194087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2022-0185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0185.html</URL>
        <Description>CVE-2022-0185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194517</URL>
        <Description>SUSE Bug 1194517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194737</URL>
        <Description>SUSE Bug 1194737</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).</Note>
    </Notes>
    <CVE>CVE-2022-0322</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-68.1</ProductID>
        <ProductID>SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-68.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20220289-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0322.html</URL>
        <Description>CVE-2022-0322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194985</URL>
        <Description>SUSE Bug 1194985</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
