The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0796-1 advisory.
An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file ‘/dev/dri/renderD128 (or Dxxx)’. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS). (CVE-2022-36280)
A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file ‘/dev/dri/renderD128 (or Dxxx)’. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
(CVE-2022-38096)
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96 (CVE-2023-0045)
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c (CVE-2023-0461)
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory. (CVE-2023-0597)
In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls. (CVE-2023-22995)
In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition. (CVE-2023-23559)
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. (CVE-2023-26545)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2023:0796-1. The text itself
# is copyright (C) SUSE.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(172665);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/14");
script_cve_id(
"CVE-2022-36280",
"CVE-2022-38096",
"CVE-2023-0045",
"CVE-2023-0461",
"CVE-2023-0597",
"CVE-2023-22995",
"CVE-2023-23559",
"CVE-2023-26545"
);
script_xref(name:"SuSE", value:"SUSE-SU-2023:0796-1");
script_name(english:"SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2023:0796-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are
affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0796-1 advisory.
- An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in
drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128
(or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing
a denial of service(DoS). (CVE-2022-36280)
- A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c
in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a
local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
(CVE-2022-38096)
- The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The
ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL
MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the
TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to
the prctl syscall. The patch that added the support for the conditional mitigation via prctl
(ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit
a664ec9158eeddd75121d39c9a0758016097fa96 (CVE-2023-0045)
- There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local
privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or
CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a
use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can
install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this
socket is disconnected and reused as a listener. If a new socket is created from the listener, the context
is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend
upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c (CVE-2023-0461)
- A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was
found in the way user can guess location of exception stack(s) or other important data. A local user could
use this flaw to get access to some important data with expected location in memory. (CVE-2023-0597)
- In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in
drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls. (CVE-2023-22995)
- In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an
integer overflow in an addition. (CVE-2023-23559)
- In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure
(for registering the sysctl table under a new location) during the renaming of a device. (CVE-2023-26545)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1166486");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1177529");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203331");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1203332");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1204993");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1205544");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206224");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206232");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206459");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206640");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206876");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206877");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206878");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206880");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206881");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206882");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206884");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206885");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206886");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206889");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1206894");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207051");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207270");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207328");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207588");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207589");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207590");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207591");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207592");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207593");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207594");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207603");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207605");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207606");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207608");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207609");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207610");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207613");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207615");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207617");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207618");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207619");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207620");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207621");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207623");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207624");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207625");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207626");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207630");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207631");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207632");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207634");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207636");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207638");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207639");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207641");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207642");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207643");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207644");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207645");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207646");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207648");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207651");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207770");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207773");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207845");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1207875");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208149");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208153");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208183");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208212");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208290");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208420");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208428");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208429");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208449");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208534");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208541");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208570");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208700");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208741");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208759");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208784");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1208787");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1209188");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-36280");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2022-38096");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-0045");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-0461");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-0597");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-22995");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-23559");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2023-26545");
# https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e6951a3b");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-0045");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2023-23559");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/09/09");
script_set_attribute(attribute:"patch_publication_date", value:"2023/03/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/03/18");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:cluster-md-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:dlm-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:gfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-64kb-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_49-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-macros");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-obs-build");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-zfcpdump");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ocfs2-kmp-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES|SUSE)") audit(AUDIT_OS_NOT, "SUSE / openSUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)(?:_SAP)?\d+|SUSE([\d.]+))", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE / openSUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED15|SLED_SAP15|SLES15|SLES_SAP15|SUSE15\.4)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15', 'SUSE / openSUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE / openSUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLED15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED15 SP4", os_ver + " SP" + service_pack);
if (os_ver == "SLED_SAP15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLED_SAP15 SP4", os_ver + " SP" + service_pack);
if (os_ver == "SLES15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES15 SP4", os_ver + " SP" + service_pack);
if (os_ver == "SLES_SAP15" && (! preg(pattern:"^(4)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES_SAP15 SP4", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'kernel-64kb-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-64kb-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-extra-5.14.21-150400.24.49.3', 'sp':'4', 'cpu':'x86_64', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-default-extra-5.14.21-150400.24.49.3', 'sp':'4', 'cpu':'x86_64', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-zfcpdump-5.14.21-150400.24.49.4', 'sp':'4', 'cpu':'s390x', 'release':'SLED_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-zfcpdump-5.14.21-150400.24.49.4', 'sp':'4', 'cpu':'s390x', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES_SAP15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLES_SAP-release-15.4']},
{'reference':'kernel-64kb-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-64kb-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.49.2', 'sp':'4', 'cpu':'aarch64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-development-tools-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-development-tools-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-development-tools-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-development-tools-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-development-tools-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.49.4', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-development-tools-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-zfcpdump-5.14.21-150400.24.49.4', 'sp':'4', 'cpu':'s390x', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-zfcpdump-5.14.21-150400.24.49.4', 'sp':'4', 'cpu':'s390x', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-basesystem-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['SLE_HPC-release-15.4', 'sle-module-legacy-release-15.4', 'sles-release-15.4']},
{'reference':'cluster-md-kmp-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'cluster-md-kmp-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dlm-kmp-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dlm-kmp-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-allwinner-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-altera-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-amazon-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-amd-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-amlogic-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-apm-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-apple-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-arm-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-broadcom-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-cavium-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-exynos-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-freescale-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-hisilicon-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-lg-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-marvell-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-mediatek-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-nvidia-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-qcom-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-renesas-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-rockchip-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-socionext-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-sprd-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'dtb-xilinx-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'gfs2-kmp-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'gfs2-kmp-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-64kb-devel-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-64kb-extra-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-64kb-livepatch-devel-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-64kb-optional-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-debug-5.14.21-150400.24.49.3', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-debug-devel-5.14.21-150400.24.49.3', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-debug-livepatch-devel-5.14.21-150400.24.49.3', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-base-rebuild-5.14.21-150400.24.49.3.150400.24.19.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-devel-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-extra-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-livepatch-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-livepatch-devel-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-default-optional-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-devel-5.14.21-150400.24.49.4', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-kvmsmall-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-kvmsmall-5.14.21-150400.24.49.4', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-kvmsmall-devel-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-kvmsmall-devel-5.14.21-150400.24.49.4', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.49.4', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.49.4', 'cpu':'x86_64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-macros-5.14.21-150400.24.49.4', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-obs-build-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-obs-qa-5.14.21-150400.24.49.2', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-source-5.14.21-150400.24.49.4', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-source-vanilla-5.14.21-150400.24.49.4', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-syms-5.14.21-150400.24.49.4', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kernel-zfcpdump-5.14.21-150400.24.49.4', 'cpu':'s390x', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kselftests-kmp-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'kselftests-kmp-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'ocfs2-kmp-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'ocfs2-kmp-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'reiserfs-kmp-64kb-5.14.21-150400.24.49.2', 'cpu':'aarch64', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'reiserfs-kmp-default-5.14.21-150400.24.49.3', 'release':'SUSE15.4', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['openSUSE-release-15.4']},
{'reference':'cluster-md-kmp-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'dlm-kmp-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'gfs2-kmp-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'ocfs2-kmp-default-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-ha-release-15.4']},
{'reference':'kernel-default-livepatch-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.4']},
{'reference':'kernel-default-livepatch-devel-5.14.21-150400.24.49.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.4']},
{'reference':'kernel-livepatch-5_14_21-150400_24_49-default-1-150400.9.3.3', 'sp':'4', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-module-live-patching-release-15.4']},
{'reference':'kernel-default-extra-5.14.21-150400.24.49.3', 'sp':'4', 'cpu':'x86_64', 'release':'SLED15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-15.4', 'sled-release-15.4', 'sles-release-15.4']},
{'reference':'kernel-default-extra-5.14.21-150400.24.49.3', 'sp':'4', 'cpu':'x86_64', 'release':'SLES15', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sle-we-release-15.4', 'sled-release-15.4', 'sles-release-15.4']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cluster-md-kmp-64kb / cluster-md-kmp-default / dlm-kmp-64kb / etc');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545
www.nessus.org/u?e6951a3b
bugzilla.suse.com/1166486
bugzilla.suse.com/1177529
bugzilla.suse.com/1203331
bugzilla.suse.com/1203332
bugzilla.suse.com/1204993
bugzilla.suse.com/1205544
bugzilla.suse.com/1206224
bugzilla.suse.com/1206232
bugzilla.suse.com/1206459
bugzilla.suse.com/1206640
bugzilla.suse.com/1206876
bugzilla.suse.com/1206877
bugzilla.suse.com/1206878
bugzilla.suse.com/1206880
bugzilla.suse.com/1206881
bugzilla.suse.com/1206882
bugzilla.suse.com/1206883
bugzilla.suse.com/1206884
bugzilla.suse.com/1206885
bugzilla.suse.com/1206886
bugzilla.suse.com/1206889
bugzilla.suse.com/1206894
bugzilla.suse.com/1207051
bugzilla.suse.com/1207270
bugzilla.suse.com/1207328
bugzilla.suse.com/1207588
bugzilla.suse.com/1207589
bugzilla.suse.com/1207590
bugzilla.suse.com/1207591
bugzilla.suse.com/1207592
bugzilla.suse.com/1207593
bugzilla.suse.com/1207594
bugzilla.suse.com/1207603
bugzilla.suse.com/1207605
bugzilla.suse.com/1207606
bugzilla.suse.com/1207607
bugzilla.suse.com/1207608
bugzilla.suse.com/1207609
bugzilla.suse.com/1207610
bugzilla.suse.com/1207613
bugzilla.suse.com/1207615
bugzilla.suse.com/1207617
bugzilla.suse.com/1207618
bugzilla.suse.com/1207619
bugzilla.suse.com/1207620
bugzilla.suse.com/1207621
bugzilla.suse.com/1207623
bugzilla.suse.com/1207624
bugzilla.suse.com/1207625
bugzilla.suse.com/1207626
bugzilla.suse.com/1207628
bugzilla.suse.com/1207630
bugzilla.suse.com/1207631
bugzilla.suse.com/1207632
bugzilla.suse.com/1207634
bugzilla.suse.com/1207635
bugzilla.suse.com/1207636
bugzilla.suse.com/1207638
bugzilla.suse.com/1207639
bugzilla.suse.com/1207641
bugzilla.suse.com/1207642
bugzilla.suse.com/1207643
bugzilla.suse.com/1207644
bugzilla.suse.com/1207645
bugzilla.suse.com/1207646
bugzilla.suse.com/1207647
bugzilla.suse.com/1207648
bugzilla.suse.com/1207651
bugzilla.suse.com/1207653
bugzilla.suse.com/1207770
bugzilla.suse.com/1207773
bugzilla.suse.com/1207845
bugzilla.suse.com/1207875
bugzilla.suse.com/1208149
bugzilla.suse.com/1208153
bugzilla.suse.com/1208183
bugzilla.suse.com/1208212
bugzilla.suse.com/1208290
bugzilla.suse.com/1208420
bugzilla.suse.com/1208428
bugzilla.suse.com/1208429
bugzilla.suse.com/1208449
bugzilla.suse.com/1208534
bugzilla.suse.com/1208541
bugzilla.suse.com/1208570
bugzilla.suse.com/1208607
bugzilla.suse.com/1208628
bugzilla.suse.com/1208700
bugzilla.suse.com/1208741
bugzilla.suse.com/1208759
bugzilla.suse.com/1208784
bugzilla.suse.com/1208787
bugzilla.suse.com/1209188
www.suse.com/security/cve/CVE-2022-36280
www.suse.com/security/cve/CVE-2022-38096
www.suse.com/security/cve/CVE-2023-0045
www.suse.com/security/cve/CVE-2023-0461
www.suse.com/security/cve/CVE-2023-0597
www.suse.com/security/cve/CVE-2023-22995
www.suse.com/security/cve/CVE-2023-23559
www.suse.com/security/cve/CVE-2023-26545