Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-14284 (GCVE-0-2019-14284)
Vulnerability from cvelistv5
Published
2019-07-26 12:25
Modified
2024-08-05 00:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "DSA-4495", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4495" }, { "name": "20190812 [SECURITY] [DSA 4495-1] linux security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "name": "20190813 [SECURITY] [DSA 4497-1] linux security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "name": "DSA-4497", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4497" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "name": "20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "openSUSE-SU-2019:1924", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "name": "openSUSE-SU-2019:1923", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "name": "USN-4117-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4114-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4114-1/" }, { "name": "USN-4115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4116-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4116-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-23T19:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "DSA-4495", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4495" }, { "name": "20190812 [SECURITY] [DSA 4495-1] linux security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "name": "20190813 [SECURITY] [DSA 4497-1] linux security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "name": "DSA-4497", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4497" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "name": "20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "openSUSE-SU-2019:1924", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "name": "openSUSE-SU-2019:1923", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "name": "USN-4117-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4114-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4114-1/" }, { "name": "USN-4115-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4116-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4116-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "name": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32", "refsource": "MISC", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "DSA-4495", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4495" }, { "name": "20190812 [SECURITY] [DSA 4495-1] linux security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "name": "20190813 [SECURITY] [DSA 4497-1] linux security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "name": "DSA-4497", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4497" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "name": "20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "name": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "openSUSE-SU-2019:1924", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "name": "openSUSE-SU-2019:1923", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "name": "USN-4117-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4114-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4114-1/" }, { "name": "USN-4115-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4116-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4116-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20190905-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "name": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14284", "datePublished": "2019-07-26T12:25:01", "dateReserved": "2019-07-26T00:00:00", "dateUpdated": "2024-08-05T00:12:43.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-14284\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-07-26T13:15:13.113\",\"lastModified\":\"2024-11-21T04:26:22.260\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux anterior a versi\u00f3n 5.2.3, el archivo drivers/block/floppy.c, permite una denegaci\u00f3n de servicio mediante la divisi\u00f3n por cero de la funci\u00f3n setup_format_params. Dos ioctls consecutivos pueden desencadenar el error: el primero debe establecer la geometr\u00eda de la unidad con valores .sect y .rate que hacen que F_SECT_PER_TRACK sea cero. A continuaci\u00f3n, se debe llamar a la operaci\u00f3n de formato de disquete. Puede ser activado por un usuario local sin privilegios incluso cuando no se ha insertado un disquete. NOTA: QEMU crea el dispositivo de disquete de por defecto.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-369\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.3\",\"matchCriteriaId\":\"38844317-DEDF-4600-BA0E-C7D28D8EC200\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/13\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/18\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/26\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190905-0002/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4114-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4115-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4116-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4117-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4495\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4497\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190905-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4114-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4115-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4116-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4117-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2019:2071-1
Vulnerability from csaf_suse
Published
2019-08-06 22:51
Modified
2019-08-06 22:51
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
Patchnames
SUSE-2019-2071,SUSE-SLE-Module-Basesystem-15-2019-2071,SUSE-SLE-Module-Development-Tools-15-2019-2071,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2071,SUSE-SLE-Module-Legacy-15-2019-2071,SUSE-SLE-Module-Live-Patching-15-2019-2071,SUSE-SLE-Product-HA-15-2019-2071,SUSE-SLE-Product-WE-15-2019-2071
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\nThe following non-security bugs were fixed:\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\nalsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2071,SUSE-SLE-Module-Basesystem-15-2019-2071,SUSE-SLE-Module-Development-Tools-15-2019-2071,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2071,SUSE-SLE-Module-Legacy-15-2019-2071,SUSE-SLE-Module-Live-Patching-15-2019-2071,SUSE-SLE-Product-HA-15-2019-2071,SUSE-SLE-Product-WE-15-2019-2071", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2071-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2071-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192071-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2071-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-06T22:51:46Z", "generator": { "date": "2019-08-06T22:51:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2071-1", "initial_release_date": "2019-08-06T22:51:46Z", "revision_history": [ { "date": "2019-08-06T22:51:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.32.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.32.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-al-4.12.14-150.32.1.aarch64", "product_id": "dtb-al-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-150.32.1.aarch64", "product_id": "dtb-allwinner-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-altera-4.12.14-150.32.1.aarch64", "product_id": "dtb-altera-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-amd-4.12.14-150.32.1.aarch64", "product_id": "dtb-amd-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-150.32.1.aarch64", "product_id": "dtb-amlogic-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-apm-4.12.14-150.32.1.aarch64", "product_id": "dtb-apm-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-arm-4.12.14-150.32.1.aarch64", "product_id": "dtb-arm-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-150.32.1.aarch64", "product_id": "dtb-broadcom-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-150.32.1.aarch64", "product_id": "dtb-cavium-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-150.32.1.aarch64", "product_id": "dtb-exynos-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-150.32.1.aarch64", "product_id": "dtb-freescale-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-150.32.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-lg-4.12.14-150.32.1.aarch64", "product_id": "dtb-lg-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-150.32.1.aarch64", "product_id": "dtb-marvell-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-150.32.1.aarch64", "product_id": "dtb-mediatek-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-150.32.1.aarch64", "product_id": "dtb-nvidia-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-150.32.1.aarch64", "product_id": "dtb-qcom-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-150.32.1.aarch64", "product_id": "dtb-renesas-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-150.32.1.aarch64", "product_id": "dtb-rockchip-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-150.32.1.aarch64", "product_id": "dtb-socionext-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-150.32.1.aarch64", "product_id": "dtb-sprd-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-150.32.1.aarch64", "product_id": "dtb-xilinx-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-150.32.1.aarch64", "product": { "name": "dtb-zte-4.12.14-150.32.1.aarch64", "product_id": "dtb-zte-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.32.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.32.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.32.1.aarch64", "product_id": "kernel-default-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.32.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.32.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.32.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.32.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.32.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.32.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.32.1.aarch64", "product_id": "kernel-syms-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.32.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.32.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.32.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.32.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.32.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.32.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.32.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.32.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.32.1.noarch", "product_id": "kernel-devel-4.12.14-150.32.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.32.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.32.1.noarch", "product_id": "kernel-docs-4.12.14-150.32.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.32.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.32.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.32.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.32.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.32.1.noarch", "product_id": "kernel-macros-4.12.14-150.32.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.32.1.noarch", "product": { "name": "kernel-source-4.12.14-150.32.1.noarch", "product_id": "kernel-source-4.12.14-150.32.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.32.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.32.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.32.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.32.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.32.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.32.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.32.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.32.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.32.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.32.1.ppc64le", "product_id": "kernel-default-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.32.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.32.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.32.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.32.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.32.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.32.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.32.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.32.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.32.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.32.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.32.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.32.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.32.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.32.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.32.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.32.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.32.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-4.12.14-150.32.1.s390x", "product_id": "kernel-default-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.32.1.s390x", "product_id": "kernel-default-base-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.32.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.32.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.32.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.32.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.32.1.s390x", "product_id": "kernel-default-man-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.32.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.32.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.32.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.32.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.32.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.32.1.s390x", "product_id": "kernel-syms-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.32.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.32.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.32.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.32.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.32.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.32.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.32.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.32.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.32.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.32.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.32.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.32.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.32.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.32.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.32.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.32.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.32.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.32.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.32.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.32.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.32.1.x86_64", "product_id": "kernel-debug-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.32.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.32.1.x86_64", "product_id": "kernel-default-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.32.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.32.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.32.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.32.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.32.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.32.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.32.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.32.1.x86_64", "product_id": "kernel-syms-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.32.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.32.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.32.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.32.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.32.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.32.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.32.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.32.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.32.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.32.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.32.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.32.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.32.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.32.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-150.32.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-150.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_32-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.32.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.32.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:46Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2262-1
Vulnerability from csaf_suse
Published
2019-09-02 07:05
Modified
2019-09-02 07:05
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
The following non-security bugs were fixed:
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).
Patchnames
SUSE-2019-2262,SUSE-SLE-Module-Public-Cloud-12-2019-2262,SUSE-SLE-SAP-12-SP1-2019-2262,SUSE-SLE-SERVER-12-SP1-2019-2262
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n\nThe following non-security bugs were fixed:\n\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652, bsc#1144288).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652, bsc#1144288).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).\n- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).\n- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2262,SUSE-SLE-Module-Public-Cloud-12-2019-2262,SUSE-SLE-SAP-12-SP1-2019-2262,SUSE-SLE-SERVER-12-SP1-2019-2262", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2262-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2262-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192262-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2262-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1138744", "url": "https://bugzilla.suse.com/1138744" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142098", "url": "https://bugzilla.suse.com/1142098" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1144257", "url": "https://bugzilla.suse.com/1144257" }, { "category": "self", "summary": "SUSE Bug 1144273", "url": "https://bugzilla.suse.com/1144273" }, { "category": "self", "summary": "SUSE Bug 1144288", "url": "https://bugzilla.suse.com/1144288" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-09-02T07:05:01Z", "generator": { "date": "2019-09-02T07:05:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2262-1", "initial_release_date": "2019-09-02T07:05:01Z", "revision_history": [ { "date": "2019-09-02T07:05:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.121.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.121.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.121.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.74-60.64.121.1.noarch", "product": { "name": "kernel-docs-3.12.74-60.64.121.1.noarch", "product_id": "kernel-docs-3.12.74-60.64.121.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.121.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.121.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.121.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.121.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.121.1.noarch", "product_id": "kernel-source-3.12.74-60.64.121.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.12.74-60.64.121.1.noarch", "product": { "name": "kernel-source-vanilla-3.12.74-60.64.121.1.noarch", "product_id": "kernel-source-vanilla-3.12.74-60.64.121.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-debug-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-debug-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-debug-base-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-debug-base-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-debug-devel-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-debug-devel-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-debug-extra-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-debug-extra-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-default-extra-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-default-extra-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-obs-build-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-obs-qa-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-obs-qa-3.12.74-60.64.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.121.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.121.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.121.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.121.1.s390x", "product_id": "kernel-default-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.121.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.121.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-default-extra-3.12.74-60.64.121.1.s390x", "product_id": "kernel-default-extra-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.121.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-obs-build-3.12.74-60.64.121.1.s390x", "product_id": "kernel-obs-build-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-obs-qa-3.12.74-60.64.121.1.s390x", "product_id": "kernel-obs-qa-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.121.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-vanilla-3.12.74-60.64.121.1.s390x", "product_id": "kernel-vanilla-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.121.1.s390x", "product_id": "kernel-vanilla-devel-3.12.74-60.64.121.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-3.12.74-60.64.121.1.s390x", "product": { "name": "kernel-zfcpdump-3.12.74-60.64.121.1.s390x", "product_id": "kernel-zfcpdump-3.12.74-60.64.121.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-debug-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-debug-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-debug-base-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-debug-base-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-debug-devel-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-debug-devel-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-debug-extra-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-debug-extra-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-default-extra-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-default-extra-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-ec2-base-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-ec2-base-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-obs-build-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-obs-build-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-obs-qa-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-obs-qa-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-vanilla-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-vanilla-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-vanilla-devel-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.12.74-60.64.121.1.x86_64", "product": { "name": "kernel-xen-extra-3.12.74-60.64.121.1.x86_64", "product_id": "kernel-xen-extra-3.12.74-60.64.121.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.121.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.121.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.121.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_121-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:05:01Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2070-1
Vulnerability from csaf_suse
Published
2019-08-06 22:51
Modified
2019-08-06 22:51
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: fix PCIE device wake up failed (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- carl9170: fix misuse of device driver API (bsc#1111666).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/meson: Add support for XBGR8888 + ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/nouveau/i2c: Enable i2c pads + busses during preinit (bsc#1051510).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).
- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).
- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).
- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- iwlwifi: correct one of the PCI struct names (bsc#1111666).
- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- kabi fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci/aer: Use cached AER Capability offset (bsc#1142623).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).
- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).
- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).
- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).
- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).
- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).
- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).
- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).
- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).
- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).
- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).
- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).
- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).
- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).
- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).
- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst->atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: qedf: Add additional checks for io_req->sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
Patchnames
SUSE-2019-2070,SUSE-SLE-SERVER-12-SP4-2019-2070
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\nThe following non-security bugs were fixed:\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/meson: Add support for XBGR8888 + ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/nouveau/i2c: Enable i2c pads + busses during preinit (bsc#1051510).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).\n- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).\n- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).\n- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- kabi fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507). \n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci/aer: Use cached AER Capability offset (bsc#1142623).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).\n- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).\n- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).\n- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).\n- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).\n- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).\n- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).\n- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).\n- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).\n- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).\n- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).\n- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).\n- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst-\u003eatid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: qedf: Add additional checks for io_req-\u003esc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 -\u003e \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2070,SUSE-SLE-SERVER-12-SP4-2019-2070", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2070-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2070-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192070-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2070-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1136896", "url": "https://bugzilla.suse.com/1136896" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-06T22:51:01Z", "generator": { "date": "2019-08-06T22:51:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2070-1", "initial_release_date": "2019-08-06T22:51:01Z", "revision_history": [ { "date": "2019-08-06T22:51:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-6.23.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-6.23.1.noarch", "product_id": "kernel-devel-azure-4.12.14-6.23.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-6.23.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-6.23.1.noarch", "product_id": "kernel-source-azure-4.12.14-6.23.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-6.23.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-6.23.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-6.23.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-6.23.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-6.23.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-6.23.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-azure-4.12.14-6.23.1.x86_64", "product_id": "kernel-azure-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-6.23.1.x86_64", "product_id": "kernel-azure-base-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-6.23.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-6.23.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-azure-kgraft-4.12.14-6.23.1.x86_64", "product_id": "kernel-azure-kgraft-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-6.23.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-6.23.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-6.23.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-6.23.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-6.23.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-6.23.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-6.23.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-6.23.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-6.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.23.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.23.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.23.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.23.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:51:01Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2450-1
Vulnerability from csaf_suse
Published
2019-09-24 11:56
Modified
2019-09-24 11:56
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise Server 12 SP4 Realtime Kernel was updated to fix bugs and security issues.
Security issues fixed:
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).
- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-1125: Enable Spectre v1 mitigations for SWAPGS (bsc#1139358).
- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)
- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker's web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#1140577)
- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586)
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#1136598)
- CVE-2019-12456: a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)
- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)
Other issues fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- Abort file_remove_privs() for non-reg. files (bsc#1140888).
- acpi: Add Hygon Dhyana support (fate#327735).
- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- Add back sibling paca poiter to paca (bsc#1055117).
- added De0-Nanos-SoC board support (and others based on Altera SOC).
- Add kernel-subpackage-build.spec (FATE#326579).
- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- Add support for crct10dif-vpmsum (FATE#327696).
- Add version information to KLP_SYMBOLS file
- af_key: unconditionally clone on broadcast (bsc#1051510).
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Don't allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).
- arm64: fix acpi dependencies (bsc#1117158).
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).
- arm64/x86: Update config files.
- ASoC : cs4265 : readable register too low (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: don't set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- Build klp-symbols in kernel devel projects.
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- chardev: add additional check for minor range overlap (bsc#1051510).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Don't yell about bad mmc phases when getting (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coredump: fix race condition between collapse_huge_page() and core dumping (bnc#1133738, CVE-2019-11599).
- coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (bsc#1133738, CVE-2019-11599).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)
- Correct the patch reference tag for scsi fix (bsc#1136922 CVE-2019-12456)
- cpufreq: acpi-cpufreq: Report if CPU doesn't support boost technologies (bsc#1051510).
- cpufreq: Add Hygon Dhyana support (fate#327735).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - fix the SEV probe in kexec boot path (bsc#1136896).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#11123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dm, dax: Fix detection of DAX support (bsc#1139782).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).
- Documentation: Add MDS vulnerability documentation (bsc#1135642).
- Documentation: Correct the possible MDS sysfs values (bsc#1135642).
- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not provide kernel-default-srchash from kernel-default-base.
- Don't restrict NFSv4.2 on openSUSE (bsc#1138719).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: thermal: tsens: Don't print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/gvt: refine ggtt range validation (bsc#1113722)
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/i2c: Disable i2c bus access after ->fini() (bsc#1113722)
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support (fate#327735).
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).
- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).
- efi/arm: Don't mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: libstub: add a root memreserve config table (bsc#1117158).
- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).
- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).
- efi/arm: Revert 'Defer persistent reservations until after paging_init()' (bsc#1117158).
- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).
- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).
- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).
- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).
- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).
- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).
- efi/x86/Add missing error handling to old_memmap 1:1 mapping code (CVE-2019-12380,bsc#1136598).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- Fix kABI breakage by mwifiex security fix (CVE-2019-3846,bsc#1136424).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- floppy: fix div-by-zero in setup_format_params (CVE-2019-14283,bsc#1143191).
- floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283,bsc#1143191).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- git_sort: add crypto maintainer tree.
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- - HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- HID: wacom: correct touch resolution x/y typo (bsc#1051510).
- HID: wacom: Don't report anything prior to the tool entering range (bsc#1051510).
- HID: wacom: Don't set tool type until we're in range (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- HID: wacom: generic: Correct pad syncing (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- hwmon: (core) add thermal sensors only if dev->of_node is present (bsc#1051510).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).
- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).
- hwmon: (k10temp) Add support for family 17h (FATE#327735).
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).
- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).
- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).
- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).
- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).
- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).
- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).
- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).
- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwrng: omap - Set default quality (bsc#1051510).
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).
- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).
- IB/mlx5: Fix leaking stack memory to userspace (bsc#1143045 CVE-2018-20855).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).
- inet: switch IP ID generator to siphash (CVE-2019-10638 bsc#1140575).
- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- Input: gtco - bounds check collection indent level (CVE-2019-13631,bsc#1142023).
- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- Input: psmouse - fix build error of multiple definition (bsc#1051510).
- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).
- iommu/arm-smmu-v3: Don't disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Don't clear eventid when freeing an MSI (bsc#1051510).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: don't crash on invalid RX interrupt (bsc#1051510).
- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- Kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi: handle addition of net::hash_mix (CVE-2019-10639 bsc#1140577).
- kabi: handle addition of netns_ipv4::ip_id_key (CVE-2019-10638 bsc#1140575).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel-binary: Use -c grep option in klp project detection.
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).
- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- KMPs: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).
- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- KVM: polling: add architecture backend to disable polling (bsc#1119222).
- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).
- KVM: PPC: Validate all tces before updating tables (bsc#1061840).
- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- KVM: s390: change default halt poll time to 50us (bsc#1119222).
- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222)
- KVM: s390: fix typo in parameter description (bsc#1119222).
- KVM: s390: kABI Workaround for 'kvm_vcpu_stat'
- KVM: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- KVM: x86: fix return value for reserved EFER (bsc#1140992).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- leds: avoid flush_work in atomic context (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format doesn't match (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- Merge branch 'origin/users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'packaging' into SLE15
- Merge branch 'scripts' into SLE15
- Merge branch 'scripts' into SLE15
- Merge branch 'SLE15_EMBARGO' into SLE12-SP4_EMBARGO
- Merge branch 'SLE15_EMBARGO' into SLE12-SP4_EMBARGO
- Merge branch 'SLE15_EMBARGO' into SLE15
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE12-SP4
- Merge branch 'SLE15' into SLE15_EMBARGO
- Merge branch 'SLE15' into users/tiwai/SLE15/bsc1139358
- Merge branch 'SLE15' into users/tiwai/SLE15/bsc1139358
- Merge branch 'SLE15' into users/tiwai/SLE15/bsc1139358
- Merge branch 'users/bpetkov/SLE15/for-next' into SLE15
- Merge branch 'users/bpetkov/SLE15/for-next' into SLE15
- Merge branch 'users/dkirjanov/SLE15/for-next' into SLE15
- Merge branch 'users/fbaumanis/SLE15/for-next' into SLE15
- Merge branch 'users/fdmanana/SLE15/for-next' into SLE15
- Merge branch 'users/fdmanana/SLE15/for-next' into SLE15
- Merge branch 'users/fyang/SLE15/for-next' into SLE15
- Merge branch 'users/ggherdovich/SLE15/for-next' into SLE15
- Merge branch 'users/glin/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/hare/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jack/SLE15/for-next' into SLE15
- Merge branch 'users/jdelvare/SLE15/for-next' into SLE15
- Merge branch 'users/jgross/SLE15/for-next' into SLE15
- Merge branch 'users/jroedel/SLE15/for-next' into SLE15
- Merge branch 'users/jroedel/SLE15/for-next' into SLE15
- Merge branch 'users/jslaby/SLE15/for-next' into SLE15
- Merge branch 'users/jslaby/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/jthumshirn/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lduncan/SLE15/for-next' into SLE15
- Merge branch 'users/lhenriques/SLE15/for-next' into SLE15
- Merge branch 'users/lyan/SLE15/for-next' into SLE15
- Merge branch 'users/lyan/SLE15/for-next' into SLE15
- Merge branch 'users/mbenes/SLE15/for-next' into SLE15
- Merge branch 'users/mbenes/SLE15/for-next' into SLE15
- Merge branch 'users/mbrugger/SLE15/for-next' into SLE15
- Merge branch 'users/mgorman/SLE15/for-next' into SLE15
- Merge branch 'users/mgorman/SLE15/for-next' into SLE15
- Merge branch 'users/mhocko/SLE12-SP4/bnc1136896' into users/mhocko/SLE12-SP4/for-next
- Merge branch 'users/mhocko/SLE15/bnc1139358' into SLE15
- Merge branch 'users/mhocko/SLE15/bnc1139358' into users/mhocko/SLE12-SP4/bnc1139358
- Merge branch 'users/mhocko/SLE15/for-next' into SLE15
- Merge branch 'users/mkoutny/SLE15/for-next' into SLE15
- Merge branch 'users/mkubecek/SLE15/1137586' into SLE15_EMBARGO
- Merge branch 'users/mkubecek/SLE15/1137586' into SLE15_EMBARGO
- Merge branch 'users/mkubecek/SLE15/for-next' into SLE15
- Merge branch 'users/mkubecek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/bsc1137534-s390-jumplabel-perf' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/msuchanek/SLE15/for-next' into SLE15
- Merge branch 'users/nfbrown/SLE15/for-next' into SLE15
- Merge branch 'users/nfbrown/SLE15/for-next' into SLE15
- Merge branch 'users/ohering/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/oneukum/SLE15/for-next' into SLE15
- Merge branch 'users/osalvador/SLE15/for-next' into SLE15
- Merge branch 'users/ptesarik/SLE15/for-next' into SLE15
- Merge branch 'users/pvorel/SLE15/for-next' into SLE15
- Merge branch 'users/tbogendoerfer/SLE15/for-next' into SLE15
- Merge branch 'users/tzimmermann/SLE15/for-next' into SLE15
- Merge branch 'users/vbabka/SLE15/for-next' into SLE15
- Merge branch 'users/vbabka/SLE15/for-next' into SLE15
- Merge branch 'users/vbabka/SLE15/for-next' into SLE15
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4_EMBARGO
- Merge remote-tracking branch 'origin/SLE15' into SLE12-SP4_EMBARGO
- Merge remote-tracking branch 'origin/users/fyang/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/ghe/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/mfleming/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/mhocko/SLE12-SP4/for-next' into SLE12-SP4
- Merge remote-tracking branch 'origin/users/msuchanek/SLE12-SP4/for-next' into SLE12-SP4
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- Move patch to correct directory.
- Move stuff git_sort chokes on, out of the way
- Move upstreamed ASoC patches into sorted section
- mwifiex: Abort at too short BSS descriptor element (bsc#1136424 CVE-2019-3846).
- mwifiex: Don't abort on small, spec-compliant vendor IEs (CVE-2019-3846,bsc#1136424).
- mwifiex: fix 802.11n/WPA detection (CVE-2019-3846,bsc#1136424).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix possible buffer overflows at parsing bss descriptor
- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- netns: get more entropy from net_hash_mix() (CVE-2019-10638 bsc#1140575).
- netns: provide pure entropy for net_hash_mix() (CVE-2019-10639 bsc#1140577).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- net: use indirect call wrappers at GRO network layer (bsc#1124503).
- net: use indirect call wrappers at GRO transport layer (bsc#1124503).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- NFS add module option to limit NFSv4 minor version (jsc#PM-231).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: Don't let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393)
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- patches.fixes/mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)
- patches.fixes/scsi-vmw_pscsi-Fix-use-after-free-in-pvscsi_queue_lc.patch: Update patch metadata
- patches.suse/Btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).
- PCI: Always allow probing with driver_override (bsc#1051510).
- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).
- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).
- PCI: hv: support reporting serial number as slot information (bsc#1142701).
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- PCI: Return error if cannot probe VF (bsc#1051510).
- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support (fate#327735).
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- PM / core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).
- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test (FATE#327696).
- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).
- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).
- powerpc/process: Fix sparse address space warnings (bsc#1065729).
- powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() (bsc#1137194, CVE-2019-12614).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- powerpc/tm: Fix oops on sigreturn on systems without TM (bsc#1142265 CVE-2019-13648).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- ras/CEC: Fix binary search function (bsc#1114279).
- rds: IB: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- Replace the bluetooth fix with the upstream commit (bsc#1135556)
- Revert 'alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops' (bsc#1051510).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)' (bsc#1109137).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range' (bsc#1051510).
- Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).'
- Revert 'KMPs: provide and conflict a kernel version specific KMP name'
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995 fate#323487).
- Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)''
- Revert 'Revert 'KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).''
- Revert 'Revert 'KMPs: provide and conflict a kernel version specific KMP name''
- Revert 'Revert 'Revert 'Drop multiversion(kernel) from the KMP template (fate#323189)'''
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).'
- Revert 'serial: 8250: Don't service RX FIFO if interrupts are disabled' (bsc#1051510).
- Revert 'Sign non-x86 kernels when possible (boo#1134303)'
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).
- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).
- rpm/kernel-binary.spec.in: Update drm-kmp obsolete for SLE12-SP3/Leap-42.3
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: don't reference bogus function pointer in kdoc (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/tar-up.sh: do not make assumptions about the remote name (bsc#1141488)
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836 bsc#1134395).
- scsi: megaraid_sas: return error when create DMA pool failed (CVE-2019-11810 bsc#1134399).
- scsi: mpt3sas_ctl: fix double-fetch bug in _ctl_ioctl_main() (bsc#1136922 CVE-2019-12456).
- scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: fix error message on <qla2400 (bsc#1118139).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: fix spelling mistake: 'existant' -> 'existent' (bsc#1118139).
- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).
- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).
- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).
- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).
- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes 'res' (bsc#1137444).
- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).
- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).
- scsi: qla2xxx: Remove unused symbols (bsc#1118139).
- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).
- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).
- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- Sign non-x86 kernels when possible (boo#1134303)
- SMB3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- Staging: vc04_services: Fix a couple error codes (bsc#1051510).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: be more careful in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- team: Always enable vlan tx offload (bsc#1051510).
- test_firmware: Use correct snprintf() limit (bsc#1135642).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support (fate#327735).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).
- Update config files for NFSv4.2
- Update patches.fixes/0001-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch (bsc#1136935 CVE-2019-10126). Added CVE number
- Update patches.fixes/nfsd-COPY-and-CLONE-operations-require-the-saved-fil.patch (git-fixes, bsc#1137103, CVE-2018-16871).
- Update patches.suse/do-not-default-to-ibrs-on-skl.patch (bsc#1068032 CVE-2017-5753 bsc#1112824 jsc#SLE-7074).
- Update patch referecens for two sercurity fixes (CVE-2019-12819, bsc#1138291, CVE-2019-12818, bsc#1138293).
- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).
- Update 'SACK Panic' patches to reflect upstream state.
- Update upstream patch tags
- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- USB: core: Don't unbind interfaces following device reset failure (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).
- USB: rio500: refuse more than one device at a time (bsc#1051510).
- USB: serial: fix initial-termios handling (bsc#1135642).
- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).
- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).
- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).
- x86/apic: Add Hygon Dhyana support (fate#327735).
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).
- x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).
- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).
- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).
- x86/mce: Don't disable MCA banks when offlining a CPU on AMD (fate#327735).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358, CVE-2019-1125).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xen/pciback: Don't disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: don't clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: don't look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: don't overflow xattr listent buffer (bsc#1143105).
- xfs: don't use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: don't use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
Patchnames
SUSE-2019-2450,SUSE-SLE-RT-12-SP4-2019-2450
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise Server 12 SP4 Realtime Kernel was updated to fix bugs and security issues.\n\nSecurity issues fixed:\n\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n- CVE-2019-1125: Enable Spectre v1 mitigations for SWAPGS (bsc#1139358).\n- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker\u0027s web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#1140577)\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586)\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#1136598)\n- CVE-2019-12456: a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)\n\nOther issues fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- acpi: Add Hygon Dhyana support (fate#327735).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- added De0-Nanos-SoC board support (and others based on Altera SOC).\n- Add kernel-subpackage-build.spec (FATE#326579).\n- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Add support for crct10dif-vpmsum (FATE#327696).\n- Add version information to KLP_SYMBOLS file\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Don\u0027t allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: fix acpi dependencies (bsc#1117158).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files.\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: don\u0027t set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- Build klp-symbols in kernel devel projects.\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Don\u0027t yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coredump: fix race condition between collapse_huge_page() and core dumping (bnc#1133738, CVE-2019-11599).\n- coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (bsc#1133738, CVE-2019-11599).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)\n- Correct the patch reference tag for scsi fix (bsc#1136922 CVE-2019-12456)\n- cpufreq: acpi-cpufreq: Report if CPU doesn\u0027t support boost technologies (bsc#1051510).\n- cpufreq: Add Hygon Dhyana support (fate#327735).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - fix the SEV probe in kexec boot path (bsc#1136896).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#11123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- Documentation: Add MDS vulnerability documentation (bsc#1135642).\n- Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default-srchash from kernel-default-base.\n- Don\u0027t restrict NFSv4.2 on openSUSE (bsc#1138719).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Don\u0027t print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support (fate#327735).\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Don\u0027t mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158). \n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi/x86/Add missing error handling to old_memmap 1:1 mapping code (CVE-2019-12380,bsc#1136598).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- Fix kABI breakage by mwifiex security fix (CVE-2019-3846,bsc#1136424).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- floppy: fix div-by-zero in setup_format_params (CVE-2019-14283,bsc#1143191).\n- floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283,bsc#1143191).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- git_sort: add crypto maintainer tree.\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- - HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: Don\u0027t report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Don\u0027t set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n- hwmon: (k10temp) Add support for family 17h (FATE#327735).\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).\n- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n- IB/mlx5: Fix leaking stack memory to userspace (bsc#1143045 CVE-2018-20855).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inet: switch IP ID generator to siphash (CVE-2019-10638 bsc#1140575).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: gtco - bounds check collection indent level (CVE-2019-13631,bsc#1142023).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Don\u0027t disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Don\u0027t clear eventid when freeing an MSI (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: don\u0027t crash on invalid RX interrupt (bsc#1051510).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- Kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi: handle addition of net::hash_mix (CVE-2019-10639 bsc#1140577).\n- kabi: handle addition of netns_ipv4::ip_id_key (CVE-2019-10638 bsc#1140575).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- KMPs: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- KVM: polling: add architecture backend to disable polling (bsc#1119222).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: s390: change default halt poll time to 50us (bsc#1119222).\n- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222)\n- KVM: s390: fix typo in parameter description (bsc#1119222).\n- KVM: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027\n- KVM: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- KVM: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format doesn\u0027t match (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- Merge branch \u0027origin/users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027packaging\u0027 into SLE15\n- Merge branch \u0027scripts\u0027 into SLE15\n- Merge branch \u0027scripts\u0027 into SLE15\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE12-SP4_EMBARGO\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE12-SP4_EMBARGO\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE15\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE15_EMBARGO\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027users/bpetkov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/bpetkov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/dkirjanov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fbaumanis/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fdmanana/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fdmanana/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fyang/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ggherdovich/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/glin/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jdelvare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jgross/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jroedel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jroedel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jslaby/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jslaby/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lhenriques/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lyan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lyan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbenes/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbenes/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbrugger/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mgorman/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mgorman/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mhocko/SLE12-SP4/bnc1136896\u0027 into users/mhocko/SLE12-SP4/for-next\n- Merge branch \u0027users/mhocko/SLE15/bnc1139358\u0027 into SLE15\n- Merge branch \u0027users/mhocko/SLE15/bnc1139358\u0027 into users/mhocko/SLE12-SP4/bnc1139358\n- Merge branch \u0027users/mhocko/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkoutny/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkubecek/SLE15/1137586\u0027 into SLE15_EMBARGO\n- Merge branch \u0027users/mkubecek/SLE15/1137586\u0027 into SLE15_EMBARGO\n- Merge branch \u0027users/mkubecek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkubecek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/bsc1137534-s390-jumplabel-perf\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/nfbrown/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/nfbrown/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ohering/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/osalvador/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ptesarik/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/pvorel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/tbogendoerfer/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/tzimmermann/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4_EMBARGO\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4_EMBARGO\n- Merge remote-tracking branch \u0027origin/users/fyang/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/ghe/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/mfleming/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/mhocko/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/msuchanek/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- Move patch to correct directory.\n- Move stuff git_sort chokes on, out of the way\n- Move upstreamed ASoC patches into sorted section\n- mwifiex: Abort at too short BSS descriptor element (bsc#1136424 CVE-2019-3846).\n- mwifiex: Don\u0027t abort on small, spec-compliant vendor IEs (CVE-2019-3846,bsc#1136424).\n- mwifiex: fix 802.11n/WPA detection (CVE-2019-3846,bsc#1136424).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- netns: get more entropy from net_hash_mix() (CVE-2019-10638 bsc#1140575).\n- netns: provide pure entropy for net_hash_mix() (CVE-2019-10639 bsc#1140577).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- NFS add module option to limit NFSv4 minor version (jsc#PM-231).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: Don\u0027t let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393)\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- patches.fixes/mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- patches.fixes/scsi-vmw_pscsi-Fix-use-after-free-in-pvscsi_queue_lc.patch: Update patch metadata\n- patches.suse/Btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).\n- PCI: hv: support reporting serial number as slot information (bsc#1142701).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support (fate#327735).\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test (FATE#327696).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() (bsc#1137194, CVE-2019-12614).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/tm: Fix oops on sigreturn on systems without TM (bsc#1142265 CVE-2019-13648).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/CEC: Fix binary search function (bsc#1114279).\n- rds: IB: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- Revert \u0027alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027 (bsc#1109137).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range\u0027 (bsc#1051510).\n- Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\n- Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995 fate#323487).\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027\n- Revert \u0027Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\u0027\n- Revert \u0027Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\u0027\n- Revert \u0027Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027\u0027\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027\n- Revert \u0027serial: 8250: Don\u0027t service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).\n- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).\n- rpm/kernel-binary.spec.in: Update drm-kmp obsolete for SLE12-SP3/Leap-42.3\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: don\u0027t reference bogus function pointer in kdoc (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/tar-up.sh: do not make assumptions about the remote name (bsc#1141488)\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836 bsc#1134395).\n- scsi: megaraid_sas: return error when create DMA pool failed (CVE-2019-11810 bsc#1134399).\n- scsi: mpt3sas_ctl: fix double-fetch bug in _ctl_ioctl_main() (bsc#1136922 CVE-2019-12456).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: fix error message on \u0026lt;qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Don\u0027t leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- Sign non-x86 kernels when possible (boo#1134303)\n- SMB3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- Staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: be more careful in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- team: Always enable vlan tx offload (bsc#1051510).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support (fate#327735).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- Update config files for NFSv4.2\n- Update patches.fixes/0001-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch (bsc#1136935 CVE-2019-10126). Added CVE number\n- Update patches.fixes/nfsd-COPY-and-CLONE-operations-require-the-saved-fil.patch (git-fixes, bsc#1137103, CVE-2018-16871).\n- Update patches.suse/do-not-default-to-ibrs-on-skl.patch (bsc#1068032 CVE-2017-5753 bsc#1112824 jsc#SLE-7074).\n- Update patch referecens for two sercurity fixes (CVE-2019-12819, bsc#1138291, CVE-2019-12818, bsc#1138293).\n- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).\n- Update \u0027SACK Panic\u0027 patches to reflect upstream state.\n- Update upstream patch tags\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- USB: core: Don\u0027t unbind interfaces following device reset failure (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: fix initial-termios handling (bsc#1135642).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).\n- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).\n- x86/apic: Add Hygon Dhyana support (fate#327735).\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).\n- x86/CPU/AMD: Don\u0027t force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).\n- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).\n- x86/mce: Don\u0027t disable MCA banks when offlining a CPU on AMD (fate#327735).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358, CVE-2019-1125).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xen/pciback: Don\u0027t disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: don\u0027t clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: don\u0027t look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: don\u0027t overflow xattr listent buffer (bsc#1143105).\n- xfs: don\u0027t use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: don\u0027t use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2450,SUSE-SLE-RT-12-SP4-2019-2450", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2450-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2450-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2450-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1053043", "url": "https://bugzilla.suse.com/1053043" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 11123080", "url": "https://bugzilla.suse.com/11123080" }, { "category": "self", "summary": "SUSE Bug 1112824", "url": "https://bugzilla.suse.com/1112824" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1115688", "url": "https://bugzilla.suse.com/1115688" }, { "category": "self", "summary": "SUSE Bug 1117158", "url": "https://bugzilla.suse.com/1117158" }, { "category": "self", "summary": "SUSE Bug 1118139", "url": "https://bugzilla.suse.com/1118139" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1120566", "url": "https://bugzilla.suse.com/1120566" }, { "category": "self", "summary": "SUSE Bug 1124167", "url": "https://bugzilla.suse.com/1124167" }, { "category": "self", "summary": "SUSE Bug 1124503", "url": "https://bugzilla.suse.com/1124503" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128910", "url": "https://bugzilla.suse.com/1128910" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1132154", "url": "https://bugzilla.suse.com/1132154" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134393", "url": "https://bugzilla.suse.com/1134393" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1134671", "url": "https://bugzilla.suse.com/1134671" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135661", "url": "https://bugzilla.suse.com/1135661" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136424", "url": "https://bugzilla.suse.com/1136424" }, { "category": "self", "summary": "SUSE Bug 1136598", "url": "https://bugzilla.suse.com/1136598" }, { "category": "self", "summary": "SUSE Bug 1136811", "url": "https://bugzilla.suse.com/1136811" }, { "category": "self", "summary": "SUSE Bug 1136896", "url": "https://bugzilla.suse.com/1136896" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1136990", "url": "https://bugzilla.suse.com/1136990" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137162", "url": "https://bugzilla.suse.com/1137162" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137372", "url": "https://bugzilla.suse.com/1137372" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137444", "url": "https://bugzilla.suse.com/1137444" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137739", "url": "https://bugzilla.suse.com/1137739" }, { "category": "self", "summary": "SUSE Bug 1137752", "url": "https://bugzilla.suse.com/1137752" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139782", "url": "https://bugzilla.suse.com/1139782" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141488", "url": "https://bugzilla.suse.com/1141488" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10126 page", "url": "https://www.suse.com/security/cve/CVE-2019-10126/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12380 page", "url": "https://www.suse.com/security/cve/CVE-2019-12380/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-09-24T11:56:26Z", "generator": { "date": "2019-09-24T11:56:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2450-1", "initial_release_date": "2019-09-24T11:56:26Z", "revision_history": [ { "date": "2019-09-24T11:56:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-8.3.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-8.3.1.noarch", "product_id": "kernel-devel-rt-4.12.14-8.3.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-8.3.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-8.3.1.noarch", "product_id": "kernel-source-rt-4.12.14-8.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt-base-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-8.3.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-8.3.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-8.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-8.3.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-8.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-8.3.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-8.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-10126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10126" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10126", "url": "https://www.suse.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "SUSE Bug 1136935 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1136935" }, { "category": "external", "summary": "SUSE Bug 1137944 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1137944" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-10126", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "important" } ], "title": "CVE-2019-10126" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-12380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12380" } ], "notes": [ { "category": "general", "text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12380", "url": "https://www.suse.com/security/cve/CVE-2019-12380" }, { "category": "external", "summary": "SUSE Bug 1136598 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1136598" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-12380" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-12819" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-14284" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T11:56:26Z", "details": "moderate" } ], "title": "CVE-2019-3846" } ] }
suse-su-2019:2263-1
Vulnerability from csaf_suse
Published
2019-09-02 07:06
Modified
2019-09-02 07:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
The following non-security bugs were fixed:
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
- dlm: Fix saving of NULL callbacks (bsc#1135365).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: flush rbd_dev->watch_dwork after watch is unregistered (bsc#1143333).
- rbd: retry watch re-registration periodically (bsc#1143333).
- sched/fair: Do not free p->numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for ->numa_group (bsc#1144920).
- scsi: virtio_scsi: let host do exception handling (bsc#1141181).
- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
Patchnames
HPE-Helion-OpenStack-8-2019-2263,SUSE-2019-2263,SUSE-OpenStack-Cloud-8-2019-2263,SUSE-OpenStack-Cloud-Crowbar-8-2019-2263,SUSE-SLE-HA-12-SP3-2019-2263,SUSE-SLE-SAP-12-SP3-2019-2263,SUSE-SLE-SERVER-12-SP3-2019-2263,SUSE-SLE-SERVER-12-SP3-BCL-2019-2263,SUSE-Storage-5-2019-2263
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).\n- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).\n- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) could have caused a system lock up and a denial of service (bnc#1123161).\n- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).\n- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).\n\nThe following non-security bugs were fixed:\n\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).\n- dlm: Fix saving of NULL callbacks (bsc#1135365).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652, bsc#1144288).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652, bsc#1144288).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).\n- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).\n- qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).\n- qlge: Deduplicate lbq_buf_size (bsc#1106061).\n- qlge: Deduplicate rx buffer queue management (bsc#1106061).\n- qlge: Factor out duplicated expression (bsc#1106061).\n- qlge: Fix dma_sync_single calls (bsc#1106061).\n- qlge: Fix irq masking in INTx mode (bsc#1106061).\n- qlge: Refill empty buffer queues from wq (bsc#1106061).\n- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).\n- qlge: Remove bq_desc.maplen (bsc#1106061).\n- qlge: Remove irq_cnt (bsc#1106061).\n- qlge: Remove page_chunk.last_flag (bsc#1106061).\n- qlge: Remove qlge_bq.len size (bsc#1106061).\n- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).\n- qlge: Remove rx_ring.type (bsc#1106061).\n- qlge: Remove useless dma synchronization calls (bsc#1106061).\n- qlge: Remove useless memset (bsc#1106061).\n- qlge: Replace memset with assignment (bsc#1106061).\n- qlge: Update buffer queue prod index despite oom (bsc#1106061).\n- rbd: flush rbd_dev-\u003ewatch_dwork after watch is unregistered (bsc#1143333).\n- rbd: retry watch re-registration periodically (bsc#1143333).\n- sched/fair: Do not free p-\u003enuma_faults with concurrent readers (bsc#1144920).\n- sched/fair: Use RCU accessors consistently for -\u003enuma_group (bsc#1144920).\n- scsi: virtio_scsi: let host do exception handling (bsc#1141181).\n- x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2019-2263,SUSE-2019-2263,SUSE-OpenStack-Cloud-8-2019-2263,SUSE-OpenStack-Cloud-Crowbar-8-2019-2263,SUSE-SLE-HA-12-SP3-2019-2263,SUSE-SLE-SAP-12-SP3-2019-2263,SUSE-SLE-SERVER-12-SP3-2019-2263,SUSE-SLE-SERVER-12-SP3-BCL-2019-2263,SUSE-Storage-5-2019-2263", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2263-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2263-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192263-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2263-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" }, { "category": "self", "summary": "SUSE Bug 1106061", "url": "https://bugzilla.suse.com/1106061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1125674", "url": "https://bugzilla.suse.com/1125674" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1128977", "url": "https://bugzilla.suse.com/1128977" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1133860", "url": "https://bugzilla.suse.com/1133860" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135365", "url": "https://bugzilla.suse.com/1135365" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139826", "url": "https://bugzilla.suse.com/1139826" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1141181", "url": "https://bugzilla.suse.com/1141181" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142857", "url": "https://bugzilla.suse.com/1142857" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143048", "url": "https://bugzilla.suse.com/1143048" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143333", "url": "https://bugzilla.suse.com/1143333" }, { "category": "self", "summary": "SUSE Bug 1144257", "url": "https://bugzilla.suse.com/1144257" }, { "category": "self", "summary": "SUSE Bug 1144273", "url": "https://bugzilla.suse.com/1144273" }, { "category": "self", "summary": "SUSE Bug 1144288", "url": "https://bugzilla.suse.com/1144288" }, { "category": "self", "summary": "SUSE Bug 1144920", "url": "https://bugzilla.suse.com/1144920" }, { "category": "self", "summary": "SUSE Bug 1145920", "url": "https://bugzilla.suse.com/1145920" }, { "category": "self", "summary": "SUSE Bug 1145922", "url": "https://bugzilla.suse.com/1145922" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20856 page", "url": "https://www.suse.com/security/cve/CVE-2018-20856/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15117 page", "url": "https://www.suse.com/security/cve/CVE-2019-15117/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15118 page", "url": "https://www.suse.com/security/cve/CVE-2019-15118/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-09-02T07:06:01Z", "generator": { "date": "2019-09-02T07:06:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2263-1", "initial_release_date": "2019-09-02T07:06:01Z", "revision_history": [ { "date": "2019-09-02T07:06:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.103.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.103.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.103.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.103.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.103.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.103.1.aarch64", "product_id": "kernel-default-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.103.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.103.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.103.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.103.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.103.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.103.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.103.1.aarch64", "product_id": "kernel-syms-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.103.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.103.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.103.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.103.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.103.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.103.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.103.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.103.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.103.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.103.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.103.1.noarch", "product_id": "kernel-devel-4.4.180-94.103.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.103.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.103.1.noarch", "product_id": "kernel-macros-4.4.180-94.103.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.103.1.noarch", "product": { "name": "kernel-source-4.4.180-94.103.1.noarch", "product_id": "kernel-source-4.4.180-94.103.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.103.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.103.1.noarch", "product_id": "kernel-docs-4.4.180-94.103.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.103.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.103.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.103.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.103.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.103.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.103.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.103.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.103.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.103.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.103.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.103.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.103.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.103.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.103.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.103.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.103.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.103.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.103.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.103.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.103.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.103.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.103.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.103.1.ppc64le", "product_id": "kernel-default-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.103.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.103.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.103.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.103.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.103.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.103.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.103.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.103.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.103.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.103.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.103.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.103.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.103.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.103.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.103.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.103.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.103.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.103.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.103.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.103.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.103.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.103.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.103.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.103.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.103.1.s390x", "product": { "name": "kernel-default-4.4.180-94.103.1.s390x", "product_id": "kernel-default-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.103.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.103.1.s390x", "product_id": "kernel-default-base-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.103.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.103.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.103.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.103.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.103.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.103.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.103.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.103.1.s390x", "product_id": "kernel-default-man-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.103.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.103.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.103.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.103.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.103.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.103.1.s390x", "product_id": "kernel-syms-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.103.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.103.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.103.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.103.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.103.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.103.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.103.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.103.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.103.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.103.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.103.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.103.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.103.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.103.1.x86_64", "product_id": "kernel-default-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.103.1.x86_64", "product_id": "kernel-syms-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.103.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.103.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.103.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.103.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.103.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.103.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.103.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.103.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.103.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.103.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.103.1.x86_64", "product_id": "kernel-debug-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.103.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.103.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.103.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.103.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.103.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.103.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.103.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.103.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.103.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.103.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.103.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.103.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.103.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.103.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.103.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.103.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.103.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.103.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.103.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.103.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.103.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.103.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.103.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.103.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.103.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.103.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.103.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.103.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.103.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.103.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.103.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2018-20856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20856" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20856", "url": "https://www.suse.com/security/cve/CVE-2018-20856" }, { "category": "external", "summary": "SUSE Bug 1143048 for CVE-2018-20856", "url": "https://bugzilla.suse.com/1143048" }, { "category": "external", "summary": "SUSE Bug 1156331 for CVE-2018-20856", "url": "https://bugzilla.suse.com/1156331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "important" } ], "title": "CVE-2018-20856" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "moderate" } ], "title": "CVE-2019-14284" }, { "cve": "CVE-2019-15117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15117" } ], "notes": [ { "category": "general", "text": "parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15117", "url": "https://www.suse.com/security/cve/CVE-2019-15117" }, { "category": "external", "summary": "SUSE Bug 1145920 for CVE-2019-15117", "url": "https://bugzilla.suse.com/1145920" }, { "category": "external", "summary": "SUSE Bug 1173934 for CVE-2019-15117", "url": "https://bugzilla.suse.com/1173934" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "important" } ], "title": "CVE-2019-15117" }, { "cve": "CVE-2019-15118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15118" } ], "notes": [ { "category": "general", "text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15118", "url": "https://www.suse.com/security/cve/CVE-2019-15118" }, { "category": "external", "summary": "SUSE Bug 1145922 for CVE-2019-15118", "url": "https://bugzilla.suse.com/1145922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "moderate" } ], "title": "CVE-2019-15118" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.103.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.103.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.103.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.103.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.103.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_103-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:06:01Z", "details": "moderate" } ], "title": "CVE-2019-3819" } ] }
suse-su-2019:2299-1
Vulnerability from csaf_suse
Published
2019-09-05 06:56
Modified
2019-09-05 06:56
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).
The following non-security bugs were fixed:
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
- i40e: add functions to control default VSI (bsc#1141628).
- i40e: set default VSI without a reset (bsc#1141628).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
- sched/fair: Do not free p->numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for ->numa_group (bsc#1144920).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
Patchnames
SUSE-2019-2299,SUSE-OpenStack-Cloud-7-2019-2299,SUSE-SLE-HA-12-SP2-2019-2299,SUSE-SLE-SAP-12-SP2-2019-2299,SUSE-SLE-SERVER-12-SP2-2019-2299,SUSE-SLE-SERVER-12-SP2-BCL-2019-2299,SUSE-Storage-4-2019-2299
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": " The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) could have caused a system lock up and a denial of service (bnc#1123161).\n- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).\n- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).\n- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).\n- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).\n\n\nThe following non-security bugs were fixed:\n\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).\n- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).\n- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).\n- i40e: add functions to control default VSI (bsc#1141628).\n- i40e: set default VSI without a reset (bsc#1141628).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).\n- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).\n- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).\n- sched/fair: Do not free p-\u003enuma_faults with concurrent readers (bsc#1144920).\n- sched/fair: Use RCU accessors consistently for -\u003enuma_group (bsc#1144920).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2299,SUSE-OpenStack-Cloud-7-2019-2299,SUSE-SLE-HA-12-SP2-2019-2299,SUSE-SLE-SAP-12-SP2-2019-2299,SUSE-SLE-SERVER-12-SP2-2019-2299,SUSE-SLE-SERVER-12-SP2-BCL-2019-2299,SUSE-Storage-4-2019-2299", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2299-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2299-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192299-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2299-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" }, { "category": "self", "summary": "SUSE Bug 1045640", "url": "https://bugzilla.suse.com/1045640" }, { "category": "self", "summary": "SUSE Bug 1076033", "url": "https://bugzilla.suse.com/1076033" }, { "category": "self", "summary": "SUSE Bug 1107256", "url": "https://bugzilla.suse.com/1107256" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1140012", "url": "https://bugzilla.suse.com/1140012" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141628", "url": "https://bugzilla.suse.com/1141628" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142098", "url": "https://bugzilla.suse.com/1142098" }, { "category": "self", "summary": "SUSE Bug 1142857", "url": "https://bugzilla.suse.com/1142857" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143048", "url": "https://bugzilla.suse.com/1143048" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1144257", "url": "https://bugzilla.suse.com/1144257" }, { "category": "self", "summary": "SUSE Bug 1144273", "url": "https://bugzilla.suse.com/1144273" }, { "category": "self", "summary": "SUSE Bug 1144288", "url": "https://bugzilla.suse.com/1144288" }, { "category": "self", "summary": "SUSE Bug 1144920", "url": "https://bugzilla.suse.com/1144920" }, { "category": "self", "summary": "SUSE Bug 1145920", "url": "https://bugzilla.suse.com/1145920" }, { "category": "self", "summary": "SUSE Bug 1145922", "url": "https://bugzilla.suse.com/1145922" }, { "category": "self", "summary": "SUSE Bug 1146163", "url": "https://bugzilla.suse.com/1146163" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18551 page", "url": "https://www.suse.com/security/cve/CVE-2017-18551/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20856 page", "url": "https://www.suse.com/security/cve/CVE-2018-20856/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15117 page", "url": "https://www.suse.com/security/cve/CVE-2019-15117/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15118 page", "url": "https://www.suse.com/security/cve/CVE-2019-15118/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-09-05T06:56:18Z", "generator": { "date": "2019-09-05T06:56:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2299-1", "initial_release_date": "2019-09-05T06:56:18Z", "revision_history": [ { "date": "2019-09-05T06:56:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.120.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.120.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.120.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.120.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.120.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.120.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.120.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.120.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.120.1.aarch64", "product_id": "kernel-default-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.120.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.120.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.120.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.120.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.120.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.120.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.120.1.aarch64", "product_id": "kernel-syms-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.120.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.120.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.120.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.120.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.120.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.120.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.120.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.120.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.120.1.noarch", "product_id": "kernel-devel-4.4.121-92.120.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.120.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.120.1.noarch", "product_id": "kernel-docs-4.4.121-92.120.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.120.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.120.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.120.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.120.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.120.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.120.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.120.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.120.1.noarch", "product_id": "kernel-macros-4.4.121-92.120.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.120.1.noarch", "product": { "name": "kernel-source-4.4.121-92.120.1.noarch", "product_id": "kernel-source-4.4.121-92.120.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.120.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.120.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.120.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.120.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.120.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.120.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.120.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.120.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.120.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.120.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.120.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.120.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.120.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.120.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.120.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.120.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.120.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.120.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.120.1.ppc64le", "product_id": "kernel-default-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.120.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.120.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.120.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.120.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.120.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.120.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.120.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.120.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.120.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.120.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.120.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.120.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.120.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.120.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.120.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.120.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.120.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.120.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.120.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.120.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.120.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.120.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.120.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.120.1.s390x", "product": { "name": "kernel-default-4.4.121-92.120.1.s390x", "product_id": "kernel-default-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.120.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.120.1.s390x", "product_id": "kernel-default-base-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.120.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.120.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.120.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.120.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.120.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.120.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.120.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.120.1.s390x", "product_id": "kernel-default-man-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.120.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.120.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.120.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.120.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.120.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.120.1.s390x", "product_id": "kernel-syms-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.120.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.120.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.120.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.120.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.120.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.120.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.120.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.120.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.120.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.120.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.120.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.120.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.120.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.120.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.120.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.120.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.120.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.120.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.120.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.120.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.120.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.120.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.120.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.120.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.120.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.120.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.120.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.120.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.120.1.x86_64", "product_id": "kernel-debug-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.120.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.120.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.120.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.120.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.120.1.x86_64", "product_id": "kernel-default-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.120.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.120.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.120.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.120.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.120.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.120.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.120.1.x86_64", "product_id": "kernel-syms-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.120.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.120.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.120.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.120.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.120.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.120.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.120.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.120.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.120.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.120.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.120.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.120.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.120.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.120.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.120.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.120.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.120.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.120.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.120.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.120.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.120.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.120.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.120.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.120.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18551" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18551", "url": "https://www.suse.com/security/cve/CVE-2017-18551" }, { "category": "external", "summary": "SUSE Bug 1146163 for CVE-2017-18551", "url": "https://bugzilla.suse.com/1146163" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2017-18551" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2018-20856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20856" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20856", "url": "https://www.suse.com/security/cve/CVE-2018-20856" }, { "category": "external", "summary": "SUSE Bug 1143048 for CVE-2018-20856", "url": "https://bugzilla.suse.com/1143048" }, { "category": "external", "summary": "SUSE Bug 1156331 for CVE-2018-20856", "url": "https://bugzilla.suse.com/1156331" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "important" } ], "title": "CVE-2018-20856" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2019-14284" }, { "cve": "CVE-2019-15117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15117" } ], "notes": [ { "category": "general", "text": "parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15117", "url": "https://www.suse.com/security/cve/CVE-2019-15117" }, { "category": "external", "summary": "SUSE Bug 1145920 for CVE-2019-15117", "url": "https://bugzilla.suse.com/1145920" }, { "category": "external", "summary": "SUSE Bug 1173934 for CVE-2019-15117", "url": "https://bugzilla.suse.com/1173934" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "important" } ], "title": "CVE-2019-15117" }, { "cve": "CVE-2019-15118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15118" } ], "notes": [ { "category": "general", "text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15118", "url": "https://www.suse.com/security/cve/CVE-2019-15118" }, { "category": "external", "summary": "SUSE Bug 1145922 for CVE-2019-15118", "url": "https://bugzilla.suse.com/1145922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2019-15118" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.120.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.120.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.120.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.120.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_120-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T06:56:18Z", "details": "moderate" } ], "title": "CVE-2019-3819" } ] }
suse-su-2019:2069-1
Vulnerability from csaf_suse
Published
2019-08-06 22:50
Modified
2019-08-06 22:50
Summary
Security update for the Linux Kernel for Azure
Notes
Title of the patch
Security update for the Linux Kernel for Azure
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in create_qp_common, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)
- CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. (bnc#bsc#1143189)
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)
- CVE-2019-13631: In parse_hid_report_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. (bsc#1140577)
- CVE-2019-13233: In arch/x86/lib/insn-eval.c, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation. (bnc#1140454)
- CVE-2018-20836: In the Linux kernel there was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)
- CVE-2019-12817: Linux kernel for powerpc had a bug where unrelated processes could be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected. (bsc#1138263, bsc#1139619)
- CVE-2019-12614: In dlpar_parse_cc_property there was an unchecked kstrdup of prop->name, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1137194)
- CVE-2018-16871: An attacker, who was able to mount an exported NFS filesystem, was able to trigger a null pointer dereference by using an invalid NFS sequence. This could panic the machine and deny access to the NFS server. (bsc#1137103)
- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bsc#1138293)
The following non-security bugs were fixed:
- 6lowpan: Off by one handling ->nexthdr (bsc#1051510).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: Add Hygon Dhyana support ().
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpica: Clear status of GPEs on first direct enable (bsc#1111666).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- asoc: : cs4265 : readable register too low (bsc#1051510).
- asoc:: cs42xx8: Add regcache mask dirty (bsc#1051510).
- asoc:: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- asoc:: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- asoc:: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc:: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: fix pciE device wake up failed (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).
- bnxt_en: Add support for BCM957504 (bsc#1137224).
- bnxt_en: Cap the returned MSIX vectors to the rdma driver (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Disable bus master during pci shutdown and driver unload (bsc#1104745).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bnxt_en: Fix statistics context reservation logic for rdma driver (bsc#1104745).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).
- bpf, devmap: Add missing bulk queue free (bsc#1109837).
- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).
- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).
- bpf: sockmap fix msg->sg.size account on ingress skb (bsc#1109837).
- bpf: sockmap remove duplicate queue free (bsc#1109837).
- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).
- brcmfmac: fix NULL pointer derefence during usb disconnect (bsc#1111666).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- carl9170: fix misuse of device driver API (bsc#1111666).
- ceph: factor out ceph_lookup_inode() (bsc#1138681).
- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- ceph: quota: fix quota subdir mounts (bsc#1138681).
- ceph: remove duplicated filelock ref increase (bsc#1138681).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/topology: Export die_id (jsc#SLE-5454).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().
- cpufreq: Add Hygon Dhyana support ().
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).
- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: Replace WARN_TAINT_ONCE() with pr_warn_once() (jsc#SLE-5442).
- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dmaengine: ioat: constify pci_device_id (jsc#SLE-5442).
- dmaengine: ioat: do not use DMA_ERROR_CODE (jsc#SLE-5442).
- dmaengine: ioat: fix prototype of ioat_enumerate_channels (jsc#SLE-5442).
- dmaengine: ioatdma: Add Snow Ridge ioatdma device id (jsc#SLE-5442).
- dmaengine: ioatdma: Add intr_coalesce sysfs entry (jsc#SLE-5442).
- dmaengine: ioatdma: add descriptor pre-fetch support for v3.4 (jsc#SLE-5442).
- dmaengine: ioatdma: disable DCA enabling on IOATDMA v3.4 (jsc#SLE-5442).
- dmaengine: ioatdma: set the completion address register after channel reset (jsc#SLE-5442).
- dmaengine: ioatdma: support latency tolerance report (LTR) for v3.4 (jsc#SLE-5442).
- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).
- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).
- dmaengine: tegra210-adma: restore channel status (bsc#1111666).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).
- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base/devres: introduce devm_release_action() (bsc#1103992).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/dma/ioat: Remove now-redundant smp_read_barrier_depends() (jsc#SLE-5442).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/amd/display: Set stream->mode_changed when connectors change (bsc#1111666).
- drm/amd/display: Use plane->color_space for dpp if specified (bsc#1111666).
- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).
- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).
- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).
- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).
- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).
- drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).
- drm/i915/aml: Add new Amber Lake pci ID (jsc#SLE-4986).
- drm/i915/cfl: Adding another pci Device ID (jsc#SLE-4986).
- drm/i915/cml: Add CML pci IDS (jsc#SLE-4986).
- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).
- drm/i915: Add new ICL pci ID (jsc#SLE-4986).
- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).
- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).
- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).
- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).
- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).
- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).
- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).
- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).
- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).
- drm/i915: Split some pci ids into separate groups (jsc#SLE-4986).
- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).
- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).
- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).
- drm/lease: Make sure implicit planes are leased (bsc#1111666).
- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).
- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).
- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).
- drm/mediatek: fix unbind functions (bsc#1111666).
- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).
- drm/msm: fix fb references in async update (bsc#1111666).
- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).
- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).
- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).
- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).
- drm/pl111: fix possible object reference leak (bsc#1111666).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).
- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/v3d: Handle errors from IRQ setup (bsc#1111666).
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).
- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).
- drm: Fix drm_release() and device unplug (bsc#1111666).
- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).
- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).
- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).
- drm: do not block fb changes for async plane updates (bsc#1111666).
- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- edac, amd64: Add Hygon Dhyana support ().
- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).
- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).
- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- fs: Abort file_remove_privs() for non-reg. files (bsc#1140888).
- fs: kill btrfs clear path blocking (bsc#1140139).
- fs: Btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid:: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- hid:: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hid:: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- hid:: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- hid:: wacom: Add support for Pro Pen slim (bsc#1051510).
- hid:: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- hid:: wacom: Do not report anything prior to the tool entering range (bsc#1051510).
- hid:: wacom: Do not set tool type until we're in range (bsc#1051510).
- hid:: wacom: Mark expected switch fall-through (bsc#1051510).
- hid:: wacom: Move handling of hid: quirks into a dedicated function (bsc#1051510).
- hid:: wacom: Move hid: fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- hid:: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- hid:: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- hid:: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- hid:: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- hid:: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- hid:: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- hid:: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- hid:: wacom: Work around hid: descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- hid:: wacom: convert Wacom custom usages to standard hid: usages (bsc#1051510).
- hid:: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid:: wacom: fix mistake in printk (bsc#1051510).
- hid:: wacom: generic: Correct pad syncing (bsc#1051510).
- hid:: wacom: generic: Ignore hid:_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- hid:: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- hid:: wacom: generic: Refactor generic battery handling (bsc#1051510).
- hid:: wacom: generic: Report AES battery information (bsc#1051510).
- hid:: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- hid:: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- hid:: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- hid:: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- hid:: wacom: generic: Support multiple tools per report (bsc#1051510).
- hid:: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- hid:: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- hid:: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid:: wacom: generic: read hid:_DG_CONTACTMAX from any feature report (bsc#1051510).
- hid:: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- hv/netvsc: Set probe mode to sync (bsc#1142083).
- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().
- hwmon: (k10temp) Add Hygon Dhyana support ().
- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().
- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().
- hwmon: (k10temp) Add support for family 17h ().
- hwmon: (k10temp) Add support for temperature offsets ().
- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().
- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().
- hwmon: (k10temp) Correct model name for Ryzen 1600X ().
- hwmon: (k10temp) Display both Tctl and Tdie ().
- hwmon: (k10temp) Fix reading critical temperature register ().
- hwmon: (k10temp) Make function get_raw_temp static ().
- hwmon: (k10temp) Move chip specific code into probe function ().
- hwmon: (k10temp) Only apply temperature offset if result is positive ().
- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().
- hwmon: (k10temp) Use API function to access System Management Network ().
- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().
- i2c-piix4: Add Hygon Dhyana SMBus support ().
- i2c: acorn: fix i2c warning (bsc#1135642).
- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).
- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).
- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).
- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).
- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).
- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).
- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).
- ib/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685).
- ib/hfi1: Create inline to get extended headers (bsc#1114685 ).
- ib/hfi1: Validate fault injection opcode user input (bsc#1114685 ).
- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).
- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).
- ib/mlx5: Verify DEVX general object type correctly (bsc#1103991 ).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle RMRR with pci bridge device scopes (bsc#1140961).
- iommu/vt-d: Handle pci bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).
- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).
- iwlwifi: Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: correct one of the pci struct names (bsc#1111666).
- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with pci Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).
- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kABI workaround for asus-wmi changes (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kABI: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi/severities: Whitelist airq_iv_* (s390-specific)
- kabi/severities: Whitelist more s390x internal symbols
- kabi/severities: Whitelist s390 internal-only symbols
- kabi: Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 ).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).
- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel-binary: Use -c grep option in klp project detection.
- kernel-binary: fix missing \
- kernel-binary: rpm does not support multiline condition
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- kvm: x86: fix return value for reserved EFER (bsc#1140992).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).
- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).
- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).
- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).
- mlxsw: pci: Reincrease pci reset timeout (bsc#1112374).
- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).
- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).
- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).
- mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: complete HS400 before checking status (bsc#1111666).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/mlx5: Avoid reloading already removed devices (bsc#1103990 ).
- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990).
- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 ).
- net/mlx5: Set completion EQs as shared resources (bsc#1103991 ).
- net/mlx5: Update pci error handler entries and command translation (bsc#1103991).
- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990).
- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 ).
- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990).
- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 ).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).
- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 ).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).
- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).
- net/tls: avoid NULL pointer deref on nskb->sk in fallback (bsc#1109837).
- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).
- net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).
- net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).
- net/tls: do not leak IV and record seq when offload fails (bsc#1109837).
- net/tls: do not leak partially sent record in device mode (bsc#1109837).
- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).
- net/tls: fix copy to fragments in reencrypt (bsc#1109837).
- net/tls: fix page double free on TX cleanup (bsc#1109837).
- net/tls: fix refcount adjustment in fallback (bsc#1109837).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: fix state removal with feature flags off (bsc#1109837).
- net/tls: fix the IV leaks (bsc#1109837).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).
- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).
- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).
- net: Fix missing meta data in skb with vlan packet (bsc#1109837).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: core: support XDP generic on stacked devices (bsc#1109837).
- net: do not clear sock->sk early to avoid trouble in strparser (bsc#1103990).
- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).
- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).
- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).
- net: ena: add good checksum counter (bsc#1138879).
- net: ena: add handling of llq max tx burst size (bsc#1138879).
- net: ena: add newline at the end of pr_err prints (bsc#1138879).
- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).
- net: ena: allow automatic fallback to polling mode (bsc#1138879).
- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).
- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).
- net: ena: enable negotiating larger Rx ring size (bsc#1138879).
- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).
- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).
- net: ena: fix incorrect test of supported hash function (bsc#1138879).
- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).
- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).
- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).
- net: ena: gcc 8: fix compilation warning (bsc#1138879).
- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).
- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).
- net: ena: optimise calculations for CQ doorbell (bsc#1138879).
- net: ena: remove inline keyword from functions in *.c (bsc#1138879).
- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).
- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).
- net: ena: use dev_info_once instead of static variable (bsc#1138879).
- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).
- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).
- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).
- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).
- nfs: Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- nl80211: fix station_info pertid memory leak (bsc#1051510).
- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).
- nvme-rdma: fix double freeing of async event data (bsc#1120423).
- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for pcie ports (bsc#1142623).
- pci/AER: Use cached AER Capability offset (bsc#1142623).
- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).
- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).
- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).
- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci/portdrv: Support pcie services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).
- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).
- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- pci: Return error if cannot probe VF (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: portdrv: Restore pci config state on slot reset (bsc#1142623).
- pci: fix IOU hotplug behavior (bsc#1141558)
- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- perf tools: Add Hygon Dhyana support ().
- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).
- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).
- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).
- pinctrl/amd: add get_direction handler (bsc#1140463).
- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).
- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).
- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).
- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).
- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).
- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via pci (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).
- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).
- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).
- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).
- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).
- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).
- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).
- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).
- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).
- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).
- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).
- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).
- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).
- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).
- platform/x86: mlx-platform: Remove unused define (bsc#1112374).
- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).
- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).
- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).
- pm/core: Propagate dev->power.wakeup_path when no callbacks (bsc#1051510).
- pm: ACPI/pci: Resume all devices during hibernation (bsc#1111666).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).
- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).
- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).
- ras/cec: Fix binary search function (bsc#1114279).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rdma/cxgb4: Do not expose DMA addresses (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).
- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).
- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).
- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).
- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).
- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).
- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).
- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).
- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- rpm/package-descriptions: fix typo in kernel-azure
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/airq: recognize directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).
- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).
- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).
- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).
- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).
- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).
- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).
- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).
- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).
- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: fix assignment of bus resources (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: fix struct definition for set pci function (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: improve bar check (jsc#SLE-5803).
- s390/pci: map IOV resources (jsc#SLE-5803).
- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: provide support for MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390/pci: remove stale rc (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: remove unused define (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/pci: skip VF scanning (jsc#SLE-5803).
- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 bsc#1135153 LTC#173151).
- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 bsc#1135153 LTC#173151).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/sclp: detect DIRQ facility (jsc#SLE-5789 bsc#1134730 LTC#173388).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 bsc#1135153 LTC#173151).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).
- s390: enable processes for mio instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).
- s390: revert s390-setup-fix-early-warning-messages (bsc#1140948).
- s390: show statistics for MSI IRQs (jsc#SLE-5789 bsc#1134730 LTC#173388).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.
- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes
- scripts/git_sort/git_sort.py: drop old scsi branches
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).
- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: fix spelling mistake 'Retreiving' -> 'Retrieving' (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: csiostor: Remove set but not used variable 'pln' (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst->atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).
- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).
- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).
- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).
- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).
- scsi: megaraid_sas: correct an info message (bsc#1136271).
- scsi: megaraid_sas: driver version update (bsc#1136271).
- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for ATLAS pcie switch (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add additional checks for io_req->sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: fix multipath hang (bsc#1119532).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- smb3: Fix endian warning (bsc#1137884).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: be more careful in tcp_fragment() (bsc#1139751).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).
- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools/cpupower: Add Hygon Dhyana support ().
- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: fix infinite loop in map create (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).
- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- typec: tcpm: fix compiler warning about stupid things (git-fixes).
- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: fix initial-termios handling (bsc#1135642).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).
- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().
- x86/CPU: Add Icelake model number (jsc#SLE-5226).
- x86/alternative: Init ideal_nops for Hygon Dhyana ().
- x86/amd_nb: Add support for Raven Ridge CPUs ().
- x86/amd_nb: Check vendor in AMD-only functions ().
- x86/apic: Add Hygon Dhyana support ().
- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().
- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().
- x86/cpu: Create Hygon Dhyana architecture support file ().
- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().
- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.
- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).
- x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).
- x86/events: Add Hygon Dhyana support to PMU infrastructure ().
- x86/kvm: Add Hygon Dhyana support to kvm ().
- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().
- x86/mce: Do not disable MCA banks when offlining a CPU on AMD (). This feature was requested for SLE15 but aws reverted in packaging and master.
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/pci, x86/amd_nb: Add Hygon Dhyana support to pci and northbridge ().
- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().
- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).
- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).
- x86/topology: Define topology_die_id() (jsc#SLE-5454).
- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).
- x86/umip: Make the UMIP activated message generic (bsc#1138336).
- x86/umip: Print UMIP line only once (bsc#1138336).
- x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).
- x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).
- x86/umwait: Initialize umwait control values (jsc#SLE-5187).
- x86/xen: Add Hygon Dhyana support to Xen ().
- xdp: check device pointer before clearing (bsc#1109837).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
Patchnames
SUSE-2019-2069,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2069
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel for Azure", "title": "Title of the patch" }, { "category": "description", "text": "\n\n\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in create_qp_common, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)\n- CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. (bnc#bsc#1143189)\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)\n- CVE-2019-13631: In parse_hid_report_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. (bsc#1140577)\n- CVE-2019-13233: In arch/x86/lib/insn-eval.c, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation. (bnc#1140454)\n- CVE-2018-20836: In the Linux kernel there was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. (bnc#1134395)\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)\n- CVE-2019-12817: Linux kernel for powerpc had a bug where unrelated processes could be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected. (bsc#1138263, bsc#1139619)\n- CVE-2019-12614: In dlpar_parse_cc_property there was an unchecked kstrdup of prop-\u003ename, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1137194)\n- CVE-2018-16871: An attacker, who was able to mount an exported NFS filesystem, was able to trigger a null pointer dereference by using an invalid NFS sequence. This could panic the machine and deny access to the NFS server. (bsc#1137103)\n- CVE-2019-12819: An issue was discovered in the Linux kernel The function __mdiobus_register() calls put_device(), which would trigger a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bsc#1138293)\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: Add Hygon Dhyana support ().\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpica: Clear status of GPEs on first direct enable (bsc#1111666).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- asoc: : cs4265 : readable register too low (bsc#1051510).\n- asoc:: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- asoc:: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- asoc:: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- asoc:: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc:: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: fix pciE device wake up failed (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bluetooth: Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Cap the returned MSIX vectors to the rdma driver (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Disable bus master during pci shutdown and driver unload (bsc#1104745).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bnxt_en: Fix statistics context reservation logic for rdma driver (bsc#1104745).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n- bpf, devmap: Add missing bulk queue free (bsc#1109837).\n- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n- bpf: sockmap fix msg-\u003esg.size account on ingress skb (bsc#1109837).\n- bpf: sockmap remove duplicate queue free (bsc#1109837).\n- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n- brcmfmac: fix NULL pointer derefence during usb disconnect (bsc#1111666).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- cpufreq: Add Hygon Dhyana support ().\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: Replace WARN_TAINT_ONCE() with pr_warn_once() (jsc#SLE-5442).\n- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dmaengine: ioat: constify pci_device_id (jsc#SLE-5442).\n- dmaengine: ioat: do not use DMA_ERROR_CODE (jsc#SLE-5442).\n- dmaengine: ioat: fix prototype of ioat_enumerate_channels (jsc#SLE-5442).\n- dmaengine: ioatdma: Add Snow Ridge ioatdma device id (jsc#SLE-5442).\n- dmaengine: ioatdma: Add intr_coalesce sysfs entry (jsc#SLE-5442).\n- dmaengine: ioatdma: add descriptor pre-fetch support for v3.4 (jsc#SLE-5442).\n- dmaengine: ioatdma: disable DCA enabling on IOATDMA v3.4 (jsc#SLE-5442).\n- dmaengine: ioatdma: set the completion address register after channel reset (jsc#SLE-5442).\n- dmaengine: ioatdma: support latency tolerance report (LTR) for v3.4 (jsc#SLE-5442).\n- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-adma: restore channel status (bsc#1111666).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- documentation/ABI: Document umwait control sysfs interfaces (jsc#SLE-5187).\n- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/dma/ioat: Remove now-redundant smp_read_barrier_depends() (jsc#SLE-5442).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: thermal: tsens: Do not print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/amd/display: Set stream-\u003emode_changed when connectors change (bsc#1111666).\n- drm/amd/display: Use plane-\u003ecolor_space for dpp if specified (bsc#1111666).\n- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).\n- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).\n- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).\n- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n- drm/fb-helper: generic: Do not take module ref for fbcon (bsc#1111666).\n- drm/i915/aml: Add new Amber Lake pci ID (jsc#SLE-4986).\n- drm/i915/cfl: Adding another pci Device ID (jsc#SLE-4986).\n- drm/i915/cml: Add CML pci IDS (jsc#SLE-4986).\n- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/i915/icl: Adding few more device IDs for Ice Lake (jsc#SLE-4986).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/i915: Add new AML_ULX support list (jsc#SLE-4986).\n- drm/i915: Add new ICL pci ID (jsc#SLE-4986).\n- drm/i915: Apply correct ddi translation table for AML device (jsc#SLE-4986).\n- drm/i915: Attach the pci match data to the device upon creation (jsc#SLE-4986).\n- drm/i915: Fix uninitialized mask in intel_device_info_subplatform_init (jsc#SLE-4986).\n- drm/i915: Introduce concept of a sub-platform (jsc#SLE-4986).\n- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).\n- drm/i915: Mark AML 0x87CA as ULX (jsc#SLE-4986).\n- drm/i915: Move final cleanup of drm_i915_private to i915_driver_destroy (jsc#SLE-4986).\n- drm/i915: Remove redundant device id from IS_IRONLAKE_M macro (jsc#SLE-4986).\n- drm/i915: Split Pineview device info into desktop and mobile (jsc#SLE-4986).\n- drm/i915: Split some pci ids into separate groups (jsc#SLE-4986).\n- drm/i915: start moving runtime device info to a separate struct (jsc#SLE-4986).\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n- drm/lease: Make sure implicit planes are leased (bsc#1111666).\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).\n- drm/msm: fix fb references in async update (bsc#1111666).\n- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).\n- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).\n- drm/pl111: fix possible object reference leak (bsc#1111666).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).\n- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/v3d: Handle errors from IRQ setup (bsc#1111666).\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n- drm: Fix drm_release() and device unplug (bsc#1111666).\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).\n- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).\n- drm: do not block fb changes for async plane updates (bsc#1111666).\n- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support ().\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).\n- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).\n- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- fs: Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- fs: kill btrfs clear path blocking (bsc#1140139).\n- fs: Btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid:: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- hid:: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hid:: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- hid:: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- hid:: wacom: Add support for Pro Pen slim (bsc#1051510).\n- hid:: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- hid:: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- hid:: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- hid:: wacom: Mark expected switch fall-through (bsc#1051510).\n- hid:: wacom: Move handling of hid: quirks into a dedicated function (bsc#1051510).\n- hid:: wacom: Move hid: fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- hid:: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- hid:: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- hid:: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- hid:: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- hid:: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- hid:: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- hid:: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- hid:: wacom: Work around hid: descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hid:: wacom: convert Wacom custom usages to standard hid: usages (bsc#1051510).\n- hid:: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid:: wacom: fix mistake in printk (bsc#1051510).\n- hid:: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid:: wacom: generic: Ignore hid:_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- hid:: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- hid:: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- hid:: wacom: generic: Report AES battery information (bsc#1051510).\n- hid:: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- hid:: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- hid:: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- hid:: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- hid:: wacom: generic: Support multiple tools per report (bsc#1051510).\n- hid:: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- hid:: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- hid:: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid:: wacom: generic: read hid:_DG_CONTACTMAX from any feature report (bsc#1051510).\n- hid:: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hv/netvsc: Set probe mode to sync (bsc#1142083).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 ().\n- hwmon: (k10temp) Add Hygon Dhyana support ().\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics ().\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs ().\n- hwmon: (k10temp) Add support for family 17h ().\n- hwmon: (k10temp) Add support for temperature offsets ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X ().\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X ().\n- hwmon: (k10temp) Correct model name for Ryzen 1600X ().\n- hwmon: (k10temp) Display both Tctl and Tdie ().\n- hwmon: (k10temp) Fix reading critical temperature register ().\n- hwmon: (k10temp) Make function get_raw_temp static ().\n- hwmon: (k10temp) Move chip specific code into probe function ().\n- hwmon: (k10temp) Only apply temperature offset if result is positive ().\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors ().\n- hwmon: (k10temp) Use API function to access System Management Network ().\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table ().\n- i2c-piix4: Add Hygon Dhyana SMBus support ().\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).\n- ib/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685).\n- ib/hfi1: Create inline to get extended headers (bsc#1114685 ).\n- ib/hfi1: Validate fault injection opcode user input (bsc#1114685 ).\n- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).\n- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).\n- ib/mlx5: Verify DEVX general object type correctly (bsc#1103991 ).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle RMRR with pci bridge device scopes (bsc#1140961).\n- iommu/vt-d: Handle pci bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iwlwifi: Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: correct one of the pci struct names (bsc#1111666).\n- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with pci Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kABI workaround for asus-wmi changes (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kABI: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi/severities: Whitelist airq_iv_* (s390-specific)\n- kabi/severities: Whitelist more s390x internal symbols\n- kabi/severities: Whitelist s390 internal-only symbols\n- kabi: Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- kabi: Mask no_vf_scan in struct pci_dev (jsc#SLE-5803 ).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n- mlxsw: pci: Reincrease pci reset timeout (bsc#1112374).\n- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm/page_alloc.c: avoid potential NULL pointer dereference (git fixes (mm/pagealloc)).\n- mm/page_alloc.c: fix never set ALLOC_NOFRAGMENT flag (git fixes (mm/pagealloc)).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: complete HS400 before checking status (bsc#1111666).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/mlx5: Avoid reloading already removed devices (bsc#1103990 ).\n- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990).\n- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 ).\n- net/mlx5: Set completion EQs as shared resources (bsc#1103991 ).\n- net/mlx5: Update pci error handler entries and command translation (bsc#1103991).\n- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990).\n- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 ).\n- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990).\n- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 ).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 ).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n- net/tls: avoid NULL pointer deref on nskb-\u003esk in fallback (bsc#1109837).\n- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n- net/tls: do not copy negative amounts of data in reencrypt (bsc#1109837).\n- net/tls: do not ignore netdev notifications if no TLS features (bsc#1109837).\n- net/tls: do not leak IV and record seq when offload fails (bsc#1109837).\n- net/tls: do not leak partially sent record in device mode (bsc#1109837).\n- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n- net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n- net/tls: fix page double free on TX cleanup (bsc#1109837).\n- net/tls: fix refcount adjustment in fallback (bsc#1109837).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: fix state removal with feature flags off (bsc#1109837).\n- net/tls: fix the IV leaks (bsc#1109837).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n- net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: core: support XDP generic on stacked devices (bsc#1109837).\n- net: do not clear sock-\u003esk early to avoid trouble in strparser (bsc#1103990).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n- net: ena: add good checksum counter (bsc#1138879).\n- net: ena: add handling of llq max tx burst size (bsc#1138879).\n- net: ena: add newline at the end of pr_err prints (bsc#1138879).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n- net: ena: allow automatic fallback to polling mode (bsc#1138879).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n- net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n- net: ena: fix incorrect test of supported hash function (bsc#1138879).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n- net: ena: gcc 8: fix compilation warning (bsc#1138879).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n- net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n- net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n- net: ena: use dev_info_once instead of static variable (bsc#1138879).\n- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n- nfs: Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for pcie ports (bsc#1142623).\n- pci/AER: Use cached AER Capability offset (bsc#1142623).\n- pci/IOV: Add flag so platforms can skip VF scanning (jsc#SLE-5803).\n- pci/IOV: Factor out sriov_add_vfs() (jsc#SLE-5803).\n- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci/portdrv: Support pcie services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- pci: Disable VF decoding before pcibios_sriov_disable() updates resources (jsc#SLE-5803).\n- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- pci: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- pci: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: portdrv: Restore pci config state on slot reset (bsc#1142623).\n- pci: fix IOU hotplug behavior (bsc#1141558)\n- pci: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support ().\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- pinctrl/amd: add get_direction handler (bsc#1140463).\n- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via pci (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).\n- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).\n- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).\n- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- pm/core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- pm: ACPI/pci: Resume all devices during hibernation (bsc#1111666).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppc64le: enable CONFIG_PPC_DT_CPU_FTRS (jsc#SLE-7159).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/cec: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/cec: Fix binary search function (bsc#1114279).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rdma/cxgb4: Do not expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- rdma/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992).\n- rdma/mlx5: Do not allow the user to write to the clock page (bsc#1103991).\n- rdma/mlx5: Initialize roce port info before multiport master init (bsc#1103991).\n- rdma/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992).\n- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).\n- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).\n- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).\n- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- rpm/package-descriptions: fix typo in kernel-azure\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).\n- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).\n- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).\n- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).\n- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).\n- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).\n- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).\n- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set pci function (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: improve bar check (jsc#SLE-5803).\n- s390/pci: map IOV resources (jsc#SLE-5803).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: skip VF scanning (jsc#SLE-5803).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).\n- s390: enable processes for mio instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).\n- s390: revert s390-setup-fix-early-warning-messages (bsc#1140948).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scripts/git_sort/git_sort.py: add djbw/nvdimm nvdimm-pending.\n- scripts/git_sort/git_sort.py: add nvdimm/libnvdimm-fixes\n- scripts/git_sort/git_sort.py: drop old scsi branches\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: fix spelling mistake \u0027Retreiving\u0027 -\u003e \u0027Retrieving\u0027 (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: csiostor: Remove set but not used variable \u0027pln\u0027 (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst-\u003eatid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for ATLAS pcie switch (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add additional checks for io_req-\u003esc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 -\u003e \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: fix multipath hang (bsc#1119532).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- smb3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: be more careful in tcp_fragment() (bsc#1139751).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support ().\n- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: fix infinite loop in map create (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- typec: tcpm: fix compiler warning about stupid things (git-fixes).\n- usb: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: fix initial-termios handling (bsc#1135642).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- usb: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- usb: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- usb: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- usb: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/CPU/AMD: Do not force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/CPU: Add Icelake model number (jsc#SLE-5226).\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Add support for Raven Ridge CPUs ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382). This changes definitions of some bits, but they are intended to be used only by the core, so hopefully, no KMP uses the definitions.\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate user wait instructions (jsc#SLE-5187).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to kvm ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD (). This feature was requested for SLE15 but aws reverted in packaging and master.\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to pci and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86/umwait: Add sysfs interface to control umwait C0.2 state (jsc#SLE-5187).\n- x86/umwait: Add sysfs interface to control umwait maximum time (jsc#SLE-5187).\n- x86/umwait: Initialize umwait control values (jsc#SLE-5187).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xdp: check device pointer before clearing (bsc#1109837).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2069,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2069", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2069-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2069-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192069-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2069-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1125703", "url": "https://bugzilla.suse.com/1125703" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130836", "url": "https://bugzilla.suse.com/1130836" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1134730", "url": "https://bugzilla.suse.com/1134730" }, { "category": "self", "summary": "SUSE Bug 1134738", "url": "https://bugzilla.suse.com/1134738" }, { "category": "self", "summary": "SUSE Bug 1135153", "url": "https://bugzilla.suse.com/1135153" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1136156", "url": "https://bugzilla.suse.com/1136156" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136161", "url": "https://bugzilla.suse.com/1136161" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136264", "url": "https://bugzilla.suse.com/1136264" }, { "category": "self", "summary": "SUSE Bug 1136271", "url": "https://bugzilla.suse.com/1136271" }, { "category": "self", "summary": "SUSE Bug 1136333", "url": "https://bugzilla.suse.com/1136333" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136343", "url": "https://bugzilla.suse.com/1136343" }, { "category": "self", "summary": "SUSE Bug 1136345", "url": "https://bugzilla.suse.com/1136345" }, { "category": "self", "summary": "SUSE Bug 1136348", "url": "https://bugzilla.suse.com/1136348" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137224", "url": "https://bugzilla.suse.com/1137224" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137985", "url": "https://bugzilla.suse.com/1137985" }, { "category": "self", "summary": "SUSE Bug 1138263", "url": "https://bugzilla.suse.com/1138263" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138336", "url": "https://bugzilla.suse.com/1138336" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138681", "url": "https://bugzilla.suse.com/1138681" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1138732", "url": "https://bugzilla.suse.com/1138732" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1138879", "url": "https://bugzilla.suse.com/1138879" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1139712", "url": "https://bugzilla.suse.com/1139712" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140228", "url": "https://bugzilla.suse.com/1140228" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140454", "url": "https://bugzilla.suse.com/1140454" }, { "category": "self", "summary": "SUSE Bug 1140463", "url": "https://bugzilla.suse.com/1140463" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142083", "url": "https://bugzilla.suse.com/1142083" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12817 page", "url": "https://www.suse.com/security/cve/CVE-2019-12817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13233 page", "url": "https://www.suse.com/security/cve/CVE-2019-13233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel for Azure", "tracking": { "current_release_date": "2019-08-06T22:50:58Z", "generator": { "date": "2019-08-06T22:50:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2069-1", "initial_release_date": "2019-08-06T22:50:58Z", "revision_history": [ { "date": "2019-08-06T22:50:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.13.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.13.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.13.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.13.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.13.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.13.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.13.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.13.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.13.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.13.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12817" } ], "notes": [ { "category": "general", "text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12817", "url": "https://www.suse.com/security/cve/CVE-2019-12817" }, { "category": "external", "summary": "SUSE Bug 1138263 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138263" }, { "category": "external", "summary": "SUSE Bug 1138264 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "important" } ], "title": "CVE-2019-12817" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-12819" }, { "cve": "CVE-2019-13233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13233" } ], "notes": [ { "category": "general", "text": "In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13233", "url": "https://www.suse.com/security/cve/CVE-2019-13233" }, { "category": "external", "summary": "SUSE Bug 1140454 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1140454" }, { "category": "external", "summary": "SUSE Bug 1144502 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1144502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-13233" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:58Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2068-1
Vulnerability from csaf_suse
Published
2019-08-06 22:50
Modified
2019-08-06 22:50
Summary
Security update for the Linux Azure Kernel
Notes
Title of the patch
Security update for the Linux Azure Kernel
Description of the patch
The SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in create_qp_common, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)
- CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. (bnc#bsc#1143189)
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)
- CVE-2019-13631: In parse_hid_report_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blacklist.conf: Add 'signal: Do not restart fork when signals come in.'
- blacklist.conf: Add 65fd4cb65b2d Documentation: Move L1TF to separate directory
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: kill btrfs clear path blocking (bsc#1140139).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- fs: Abort file_remove_privs() for non-reg. files (bsc#1140888).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle RMRR with pci bridge device scopes (bsc#1140961).
- iommu/vt-d: Handle pci bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).
- kabi: Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- kvm: x86: fix return value for reserved EFER (bsc#1140992).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).
- pci: Return error if cannot probe VF (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm: Add back sibling paca poiter to paca (bsc#1055117).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- rds: IB: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390: Fix booting regression (bsc#1140948).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- sctp: Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
Patchnames
SUSE-2019-2068,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2068,SUSE-SLE-Module-Public-Cloud-15-2019-2068
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Azure Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in create_qp_common, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. (bnc#bsc#1103991)\n- CVE-2019-1125: Fix Spectre V1 variant via swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. (bnc#bsc#1143189)\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. (bsc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. (bsc#1134399)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)\n- CVE-2019-13631: In parse_hid_report_descriptor, a malicious usb device could send an hid: report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\nThe following non-security bugs were fixed:\n\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blacklist.conf: Add \u0027signal: Do not restart fork when signals come in.\u0027\n- blacklist.conf: Add 65fd4cb65b2d Documentation: Move L1TF to separate directory\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: kill btrfs clear path blocking (bsc#1140139).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- fs: Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle RMRR with pci bridge device scopes (bsc#1140961).\n- iommu/vt-d: Handle pci bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).\n- kabi: Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm: Add back sibling paca poiter to paca (bsc#1055117).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- rds: IB: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390: Fix booting regression (bsc#1140948).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- sctp: Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2068,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2068,SUSE-SLE-Module-Public-Cloud-15-2019-2068", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2068-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2068-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192068-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2068-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Azure Kernel", "tracking": { "current_release_date": "2019-08-06T22:50:54Z", "generator": { "date": "2019-08-06T22:50:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2068-1", "initial_release_date": "2019-08-06T22:50:54Z", "revision_history": [ { "date": "2019-08-06T22:50:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.38.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.38.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.38.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.38.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.38.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.38.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-5.38.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-5.38.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-5.38.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-5.38.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-5.38.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-5.38.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.38.1.x86_64", "product_id": "kernel-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.38.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.38.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-5.38.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-5.38.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-5.38.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.38.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.38.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-5.38.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-5.38.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-5.38.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-5.38.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-5.38.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-5.38.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-5.38.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-5.38.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.38.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.38.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:50:54Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:14157-1
Vulnerability from csaf_suse
Published
2019-08-29 14:18
Modified
2019-08-29 14:18
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2015-9289: A buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allowed larger values such as 23 (bsc#1143179).
The following non-security bugs were fixed:
- fix detection of race between fcntl-setlk and close (bsc#1140965).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).
Patchnames
slessp4-kernel-source-14157,slexsp3-kernel-source-14157
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2015-9289: A buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allowed larger values such as 23 (bsc#1143179).\n\nThe following non-security bugs were fixed:\n\n- fix detection of race between fcntl-setlk and close (bsc#1140965).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).\n- xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-source-14157,slexsp3-kernel-source-14157", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14157-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:14157-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914157-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:14157-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1138744", "url": "https://bugzilla.suse.com/1138744" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140965", "url": "https://bugzilla.suse.com/1140965" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143179", "url": "https://bugzilla.suse.com/1143179" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE CVE CVE-2015-9289 page", "url": "https://www.suse.com/security/cve/CVE-2015-9289/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-29T14:18:28Z", "generator": { "date": "2019-08-29T14:18:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:14157-1", "initial_release_date": "2019-08-29T14:18:28Z", "revision_history": [ { "date": "2019-08-29T14:18:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.101.1.i586", "product": { "name": "kernel-default-3.0.101-108.101.1.i586", "product_id": "kernel-default-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.101.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.101.1.i586", "product_id": "kernel-default-base-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.101.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.101.1.i586", "product_id": "kernel-default-devel-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.101.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.101.1.i586", "product_id": "kernel-ec2-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.101.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.101.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.101.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.101.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.101.1.i586", "product": { "name": "kernel-pae-3.0.101-108.101.1.i586", "product_id": "kernel-pae-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.101.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.101.1.i586", "product_id": "kernel-pae-base-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.101.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.101.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.101.1.i586", "product": { "name": "kernel-source-3.0.101-108.101.1.i586", "product_id": "kernel-source-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.101.1.i586", "product": { "name": "kernel-syms-3.0.101-108.101.1.i586", "product_id": "kernel-syms-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.101.1.i586", "product": { "name": "kernel-trace-3.0.101-108.101.1.i586", "product_id": "kernel-trace-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.101.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.101.1.i586", "product_id": "kernel-trace-base-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.101.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.101.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.101.1.i586", "product": { "name": "kernel-xen-3.0.101-108.101.1.i586", "product_id": "kernel-xen-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.101.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.101.1.i586", "product_id": "kernel-xen-base-3.0.101-108.101.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.101.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.101.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.101.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.101.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.101.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.101.1.ppc64", "product_id": "kernel-default-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.101.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.101.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.101.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.101.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.101.1.ppc64", "product_id": "kernel-source-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.101.1.ppc64", "product_id": "kernel-syms-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.101.1.ppc64", "product_id": "kernel-trace-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.101.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.101.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.101.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.101.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.101.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.101.1.s390x", "product": { "name": "kernel-default-3.0.101-108.101.1.s390x", "product_id": "kernel-default-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.101.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.101.1.s390x", "product_id": "kernel-default-base-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.101.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.101.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.101.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.101.1.s390x", "product_id": "kernel-default-man-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.101.1.s390x", "product": { "name": "kernel-source-3.0.101-108.101.1.s390x", "product_id": "kernel-source-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.101.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.101.1.s390x", "product_id": "kernel-syms-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.101.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.101.1.s390x", "product_id": "kernel-trace-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.101.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.101.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.101.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.101.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.101.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.101.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.101.1.x86_64", "product_id": "kernel-default-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.101.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.101.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.101.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.101.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.101.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.101.1.x86_64", "product_id": "kernel-source-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.101.1.x86_64", "product_id": "kernel-syms-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.101.1.x86_64", "product_id": "kernel-trace-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.101.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.101.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.101.1.x86_64", "product_id": "kernel-xen-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.101.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.101.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.101.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.101.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586" }, "product_reference": "kernel-default-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586" }, "product_reference": "kernel-source-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.101.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.101.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.101.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.101.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.101.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.101.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-9289" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-9289", "url": "https://www.suse.com/security/cve/CVE-2015-9289" }, { "category": "external", "summary": "SUSE Bug 1143179 for CVE-2015-9289", "url": "https://bugzilla.suse.com/1143179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "critical" } ], "title": "CVE-2015-9289" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.101.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.101.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T14:18:28Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2073-1
Vulnerability from csaf_suse
Published
2019-08-06 22:52
Modified
2019-08-06 22:52
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: fix PCIE device wake up failed (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- carl9170: fix misuse of device driver API (bsc#1111666).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).
- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).
- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).
- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- iwlwifi: correct one of the PCI struct names (bsc#1111666).
- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- kabi fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci/aer: Use cached AER Capability offset (bsc#1142623).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).
- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).
- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).
- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).
- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).
- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).
- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).
- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).
- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).
- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).
- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).
- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).
- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).
- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).
- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).
- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst->atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: qedf: Add additional checks for io_req->sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' -> 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
Patchnames
SUSE-2019-2073,SUSE-SLE-Module-Basesystem-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2073,SUSE-SLE-Module-Legacy-15-SP1-2019-2073,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2073,SUSE-SLE-Product-HA-15-SP1-2019-2073,SUSE-SLE-Product-WE-15-SP1-2019-2073
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\nThe following non-security bugs were fixed:\n\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).\n- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).\n- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- ib/ipoib: Add child to parent list only if device initialized (bsc#1103992).\n- ib/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- kabi fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci/aer: Use cached AER Capability offset (bsc#1142623).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).\n- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).\n- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).\n- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- rdma/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).\n- rdma/srp: Accept again source addresses that do not have a port number (bsc#1103992).\n- rdma/srp: Document srp_parse_in() arguments (bsc#1103992 ).\n- rdma/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).\n- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).\n- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).\n- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).\n- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).\n- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).\n- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst-\u003eatid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: qedf: Add additional checks for io_req-\u003esc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 -\u003e \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2073,SUSE-SLE-Module-Basesystem-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2073,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2073,SUSE-SLE-Module-Legacy-15-SP1-2019-2073,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2073,SUSE-SLE-Product-HA-15-SP1-2019-2073,SUSE-SLE-Product-WE-15-SP1-2019-2073", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2073-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2073-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192073-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2073-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142083", "url": "https://bugzilla.suse.com/1142083" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-06T22:52:42Z", "generator": { "date": "2019-08-06T22:52:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2073-1", "initial_release_date": "2019-08-06T22:52:42Z", "revision_history": [ { "date": "2019-08-06T22:52:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.15.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.15.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-al-4.12.14-197.15.1.aarch64", "product_id": "dtb-al-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-197.15.1.aarch64", "product_id": "dtb-allwinner-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-altera-4.12.14-197.15.1.aarch64", "product_id": "dtb-altera-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-amd-4.12.14-197.15.1.aarch64", "product_id": "dtb-amd-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-197.15.1.aarch64", "product_id": "dtb-amlogic-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-apm-4.12.14-197.15.1.aarch64", "product_id": "dtb-apm-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-arm-4.12.14-197.15.1.aarch64", "product_id": "dtb-arm-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-197.15.1.aarch64", "product_id": "dtb-broadcom-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-197.15.1.aarch64", "product_id": "dtb-cavium-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-197.15.1.aarch64", "product_id": "dtb-exynos-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-197.15.1.aarch64", "product_id": "dtb-freescale-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-197.15.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-lg-4.12.14-197.15.1.aarch64", "product_id": "dtb-lg-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-197.15.1.aarch64", "product_id": "dtb-marvell-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-197.15.1.aarch64", "product_id": "dtb-mediatek-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-197.15.1.aarch64", "product_id": "dtb-nvidia-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-197.15.1.aarch64", "product_id": "dtb-qcom-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-197.15.1.aarch64", "product_id": "dtb-renesas-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-197.15.1.aarch64", "product_id": "dtb-rockchip-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-197.15.1.aarch64", "product_id": "dtb-socionext-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-197.15.1.aarch64", "product_id": "dtb-sprd-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-197.15.1.aarch64", "product_id": "dtb-xilinx-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-197.15.1.aarch64", "product": { "name": "dtb-zte-4.12.14-197.15.1.aarch64", "product_id": "dtb-zte-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.15.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.15.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.15.1.aarch64", "product_id": "kernel-default-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.15.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.15.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.15.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.15.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.15.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.15.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.15.1.aarch64", "product_id": "kernel-syms-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.15.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.15.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.15.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.15.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.15.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.15.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.15.1.noarch", "product_id": "kernel-devel-4.12.14-197.15.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.15.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.15.1.noarch", "product_id": "kernel-docs-4.12.14-197.15.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.15.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.15.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.15.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.15.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.15.1.noarch", "product_id": "kernel-macros-4.12.14-197.15.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.15.1.noarch", "product": { "name": "kernel-source-4.12.14-197.15.1.noarch", "product_id": "kernel-source-4.12.14-197.15.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.15.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.15.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.15.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.15.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.15.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.15.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.15.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.15.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.15.1.ppc64le", "product_id": "kernel-default-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.15.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.15.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.15.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.15.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.15.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.15.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.15.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.15.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.15.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.15.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.15.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.15.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.15.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.15.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.15.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.15.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-4.12.14-197.15.1.s390x", "product_id": "kernel-default-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.15.1.s390x", "product_id": "kernel-default-base-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.15.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.15.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.15.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.15.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.15.1.s390x", "product_id": "kernel-default-man-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.15.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.15.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.15.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.15.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.15.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.15.1.s390x", "product_id": "kernel-syms-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.15.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.15.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.15.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.15.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.15.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.15.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.15.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.15.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.15.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.15.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.15.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.15.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.15.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.15.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.15.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.15.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.15.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.15.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.15.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.15.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.15.1.x86_64", "product_id": "kernel-debug-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.15.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.15.1.x86_64", "product_id": "kernel-default-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.15.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.15.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.15.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.15.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.15.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.15.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.15.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.15.1.x86_64", "product_id": "kernel-syms-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.15.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.15.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.15.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.15.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.15.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.15.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.15.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.15.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:42Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
suse-su-2019:2430-1
Vulnerability from csaf_suse
Published
2019-09-23 07:31
Modified
2019-09-23 07:31
Summary
Security update for kernel-source-rt
Notes
Title of the patch
Security update for kernel-source-rt
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130: Microarchitectural Store Buffer Data Sampling (MSBDS): Stored buffers on some microprocessors utilizing speculative execution which may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1103186)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1111331)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1136586)
- CVE-2019-10124: An issue was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() runs on a thp tail page after pmd is split, an attacker could cause a denial of service (bsc#1130699).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions. (bsc#1133188)
- CVE-2019-11811: An issue was discovered in the Linux kernel There was a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module was removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. (bsc#1134397)
- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests. (bsc#1133190)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)
- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem. (bsc#1135281)
- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bsc#1120843)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bsc#1135603)
- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a '\0' character. (bsc#1134848)
- CVE-2019-9500: An issue was discovered that lead to brcmfmac heap buffer overflow. (bsc#1132681)
- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bsc#1135278)
- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bsc#1135278)
- CVE-2018-16880: A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may have lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bsc#1122767)
- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)
- CVE-2019-3882: A flaw was found in the Linux kernel's vfio interface implementation that permitted violation of the user's locked memory limit. If a device was bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may have caused a system memory exhaustion and thus a denial of service (DoS). (bsc#1131427)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bsc#1136424)
- CVE-2019-8564: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132673)
- CVE-2019-9503: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132828)
- CVE-2019-9003: In the Linux kernel, attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a 'service ipmievd restart' loop. (bsc#1126704)
- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.
- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).
- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).
- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).
- CVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. (bnc#1143189)
- CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used. (bsc#1136922)
- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. (bsc#1136598)
The following non-security bugs were fixed:
- 6lowpan: Off by one handling nexthdr (bsc#1051510).
- 9p locks: add mount option for lock retry interval (bsc#1051510).
- 9p: do not trust pdu content for stat item size (bsc#1051510).
- ARM: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).
- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).
- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).
- ARM: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).
- ARM: OMAP2+: Variable 'reg' in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).
- ARM: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).
- ARM: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).
- ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).
- ARM: iop: don't use using 64-bit DMA masks (bsc#1051510).
- ARM: orion: don't use using 64-bit DMA masks (bsc#1051510).
- ARM: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).
- ARM: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).
- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).
- ASoC : cs4265 : readable register too low (bsc#1051510).
- ASoC: Intel: avoid Oops if DMA setup fails (bsc#1051510).
- ASoC: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).
- ASoC: cs4270: Set auto-increment bit for register writes (bsc#1051510).
- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).
- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: fix valid stream condition (bsc#1051510).
- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).
- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).
- ASoC: fsl_esai: Fix missing break in switch statement (bsc#1051510).
- ASoC: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).
- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).
- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).
- ASoC: hdmi-codec: fix S/PDIF DAI (bsc#1051510).
- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).
- ASoC: max98090: Fix restore of DAPM Muxes (bsc#1051510).
- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- ASoC: nau8810: fix the issue of widget with prefixed name (bsc#1051510).
- ASoC: nau8824: fix the issue of the widget with prefix name (bsc#1051510).
- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).
- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ASoC: stm32: fix sai driver name initialisation (bsc#1051510).
- ASoC: tlv320aic32x4: Fix Common Pins (bsc#1051510).
- ASoC: topology: free created components in tplg load error (bsc#1051510).
- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).
- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).
- Abort file_remove_privs() for non-reg. files (bsc#1140888).
- Add back sibling paca poiter to paca (bsc#1055117).
- Backporting hwpoison fixes
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).
- Bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).
- Bluetooth: hidp: fix buffer overflow (bsc#1051510).
- CIFS: Do not count -ENODATA as failure for query directory (bsc#1051510).
- CIFS: Do not hide EINTR after sending network packets (bsc#1051510).
- CIFS: Do not reconnect TCP session in add_credits() (bsc#1051510).
- CIFS: Do not reset lease state to NONE on lease break (bsc#1051510).
- CIFS: Fix adjustment of credits for MTU requests (bsc#1051510).
- CIFS: Fix credit calculation for encrypted reads with errors (bsc#1051510).
- CIFS: Fix credits calculations for reads with errors (bsc#1051510).
- CIFS: Fix possible hang during async MTU reads and writes (bsc#1051510).
- CIFS: Fix read after write for files with read caching (bsc#1051510).
- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).
- Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bsc#1051510).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).
- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).
- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).
- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).
- Fix cpu online check (bsc#1051510).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).
- HID: core: move Usage Page concatenation to Main item (bsc#1093389).
- HID: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).
- HID: input: add mapping for 'Toggle Display' key (bsc#1051510).
- HID: input: add mapping for Assistant key (bsc#1051510).
- HID: input: add mapping for Expose/Overview key (bsc#1051510).
- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).
- HID: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).
- HID: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).
- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).
- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).
- HID: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).
- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).
- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).
- HID: wacom: Add support for Pro Pen slim (bsc#1051510).
- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).
- HID: wacom: Don't report anything prior to the tool entering range (bsc#1051510).
- HID: wacom: Don't set tool type until we're in range (bsc#1051510).
- HID: wacom: Mark expected switch fall-through (bsc#1051510).
- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).
- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).
- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).
- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).
- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).
- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).
- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).
- HID: wacom: Support 'in range' for Intuos/Bamboo tablets where possible (bsc#1051510).
- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).
- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).
- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).
- HID: wacom: correct touch resolution x/y typo (bsc#1051510).
- HID: wacom: fix mistake in printk (bsc#1051510).
- HID: wacom: generic: Correct pad syncing (bsc#1051510).
- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).
- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).
- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).
- HID: wacom: generic: Report AES battery information (bsc#1051510).
- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).
- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).
- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).
- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).
- HID: wacom: generic: Support multiple tools per report (bsc#1051510).
- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).
- HID: wacom: generic: add the 'Report Valid' usage (bsc#1051510).
- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).
- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).
- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).
- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992 FATE#326009).
- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991 FATE#326007).
- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).
- Improve the headset mic for Acer Aspire laptops' (bsc#1051510).
- Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).
- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- Input: introduce KEY_ASSISTANT (bsc#1051510).
- Input: psmouse - fix build error of multiple definition (bsc#1051510).
- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).
- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).
- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).
- Input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).
- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).
- KEYS: always initialize keyring_index_key::desc_len (bsc#1051510).
- KEYS: user: Align the payload buffer (bsc#1051510).
- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).
- KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).
- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).
- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).
- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).
- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).
- KVM: PPC: Validate all tces before updating tables (bsc#1061840).
- KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).
- MD: fix invalid stored role for a disk (bsc#1051510).
- NFC: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).
- PCI/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).
- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).
- PCI: Always allow probing with driver_override (bsc#1051510).
- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).
- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).
- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).
- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).
- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).
- PCI: Return error if cannot probe VF (bsc#1051510).
- PCI: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).
- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).
- PM / core: Propagate dev power.wakeup_path when no callbacks (bsc#1051510).
- RAS/CEC: Check the correct variable in the debugfs error handling (bsc#1085535).
- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).
- RAS/CEC: Fix binary search function (bsc#1114279).
- RDMA/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).
- RDMA/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).
- RDMA/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).
- RDMA/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).
- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992 FATE#326009).
- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).
- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).
- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992 FATE#326009).
- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 FATE#326009).
- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992 FATE#326009).
- Re-export snd_cards for kABI compatibility (bsc#1051510).
- Revert 'Sign non-x86 kernels when possible (boo#1134303)'
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'net: ena: ethtool: add extra properties retrieval via get_priv_flags' (bsc#1138879).
- Revert 's390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).' This broke the build with older gcc instead.
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- Revert 'svm: Fix AVIC incomplete IPI emulation' (bsc#1140133).
- SMB3: Fix endian warning (bsc#1137884).
- UAS: fix alignment of scatter/gather segments (bsc#1129770).
- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).
- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).
- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).
- USB: cdc-acm: fix unthrottle races (bsc#1051510).
- USB: core: Don't unbind interfaces following device reset failure (bsc#1051510).
- USB: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).
- USB: core: Fix unterminated string returned by usb_string() (bsc#1051510).
- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).
- USB: rio500: refuse more than one device at a time (bsc#1051510).
- USB: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).
- USB: serial: f81232: fix interrupt worker not stop (bsc#1051510).
- USB: serial: fix unthrottle races (bsc#1051510).
- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).
- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).
- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).
- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).
- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).
- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).
- USB: yurex: Fix protection fault after device removal (bsc#1051510).
- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- acpi / SBS: Fix GPE storm on recent MacBookPro's (bsc#1051510).
- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).
- acpi / utils: Drop reference in test for device presence (bsc#1051510).
- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).
- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpi: PM: Set enable_for_wake for wakeup GPEs during suspend-to-idle (bsc#1111666).
- acpi: button: reinitialize button state upon resume (bsc#1051510).
- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).
- acpi: property: restore _DSD data subnodes GUID comment (bsc#1111666).
- acpiCA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).
- acpiCA: Clear status of GPEs on first direct enable (bsc#1111666).
- acpiCA: Namespace: remove address node from global list after method termination (bsc#1051510).
- af_key: unconditionally clone on broadcast (bsc#1051510).
- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Don't allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: core: Don't refer to snd_cards array directly (bsc#1051510).
- alsa: core: Fix card races between register and disconnect (bsc#1051510).
- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).
- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).
- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).
- alsa: hda - Don't resume forcibly i915 HDMI/DP codec (bsc#1111666).
- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).
- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).
- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).
- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).
- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).
- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).
- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).
- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).
- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).
- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).
- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).
- alsa: hda/realtek - EAPD turn on later (bsc#1051510).
- alsa: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).
- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).
- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).
- alsa: hda/realtek - Move to ACT_INIT state (bsc#1111666).
- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).
- alsa: hda/realtek - Support low power consumption for ALC256 (bsc#1051510).
- alsa: hda/realtek - Support low power consumption for ALC295 (bsc#1051510).
- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).
- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).
- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).
- alsa: hda/realtek: Enable headset MIC of Acer TravelMate B114-21 with ALC233 (bsc#1111666).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda: Initialize power_state field properly (bsc#1051510).
- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).
- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).
- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: line6: use dynamic buffers (bsc#1051510).
- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).
- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).
- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).
- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).
- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).
- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).
- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).
- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).
- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).
- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).
- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).
- alsa: timer: Coding style fixes (bsc#1051510).
- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).
- alsa: timer: Make sure to clear pending ack list (bsc#1051510).
- alsa: timer: Revert active callback sync check at close (bsc#1051510).
- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).
- alsa: timer: Unify timer callback process code (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).
- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).
- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).
- alsa: usx2y: fix a double free bug (bsc#1051510).
- apparmor: enforce nullbyte at end of tag string (bsc#1051510).
- appletalk: Fix compile regression (bsc#1051510).
- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).
- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).
- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- arm64: fix acpi dependencies (bsc#1117158).
- assume flash part size to be 4MB, if it can't be determined (bsc#1127371).
- at76c50x-usb: Don't register led_trigger if usb_register_driver failed (bsc#1051510).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: avoid possible string overflow (bsc#1051510).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: fix PCIE device wake up failed (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: snoc: fix unbalanced clock error handling (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- audit: fix a memleak caused by auditing load module (bsc#1051510).
- audit: fix a memory leak bug (bsc#1051510).
- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).
- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).
- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).
- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).
- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).
- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).
- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of functions to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).
- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).
- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set flush_btree in bch_journal_free' (bsc#1140652).
- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).
- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add MODULE_DESCRIPTION information (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add a comment in super.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add code comments for bset.c (bsc#1130972).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add comment for cache_set fill_iter (bsc#1130972).
- bcache: add comment for cache_set fill_iter (bsc#1130972).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(b write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add identifier names to arguments of function definitions (bsc#1130972).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add missing SPDX header (bsc#1130972).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add static const prefix to char * array declarations (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: correct dirty data statistics (bsc#1130972).
- bcache: destroy dc writeback_write_wq if failed to create dc writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition in bcache_init() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not assign in if condition register_bcache() (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not clone bio in bch_data_verify (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: do not mark writeback_running too early (bsc#1130972).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_name via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: export backing_dev_uuid via sysfs (bsc#1130972).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix code comments style (bsc#1130972).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indent by replacing blank by tabs (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input integer overflow of congested threshold (bsc#1130972).
- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).
- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).
- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to journal_delay_ms (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bsc#1130972).
- bcache: fix input overflow to sequential_cutoff (bsc#1130972).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_delay (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix ioctl in flash device (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken code comments in bcache.h (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix mistaken comments in request.c (bsc#1130972).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo 'succesfully' to 'successfully' (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).
- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: introduce force_wake_up_gc() (bsc#1130972).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: move open brace at end of function definitions to next line (bsc#1130972).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: never writeback a discard operation (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: option to automatically run gc thread after writeback (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: panic fix for making cache device (bsc#1130972).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: prefer 'help' in Kconfig (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: recal cached_dev_sectors on detach (bsc#1130972).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove unused bch_passthrough_cache (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace '%pF' by '%pS' in seq_printf() (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: replace printk() by pr_*() routines (bsc#1130972).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: set largest seq to ja seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: set writeback_percent in a flexible range (bsc#1130972).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: split combined if-condition code into separate ones (bsc#1130972).
- bcache: stop bcache device when backing device is offline (bsc#1130972).
- bcache: stop bcache device when backing device is offline (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: stop using the deprecated get_seconds() (bsc#1130972).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to add a blank line after declarations (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fix to replace 'unsigned' by 'unsigned int' (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: style fixes for lines over 80 characters (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: treat stale and dirty keys as bad keys (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: update comment for bch_data_insert (bsc#1130972).
- bcache: update comment in sysfs.c (bsc#1130972).
- bcache: update comment in sysfs.c (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).
- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).
- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).
- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).
- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).
- blk-mq: free hw queue's resource in hctx's release handler (bsc#1140637).
- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).
- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).
- blkcg: Introduce blkg_root_lookup() (bsc#1131673).
- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).
- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).
- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).
- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).
- block: Introduce blk_exit_queue() (bsc#1131673).
- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).
- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).
- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).
- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).
- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).
- block: fix the return errno for direct IO (bsc#1135320).
- block: fix use-after-free on gendisk (bsc#1135312).
- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).
- block: remove bio_rewind_iter() (bsc#1131673).
- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).
- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).
- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).
- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).
- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).
- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnx2x: Remove set but not used variable 'mfw_vn' (bsc#1136498 jsc#SLE-4699).
- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).
- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).
- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).
- bnx2x: fix spelling mistake 'dicline' 'decline' (bsc#1136498 jsc#SLE-4699).
- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).
- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).
- bnxt_en: Add support for BCM957504 (bsc#1137224).
- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745 FATE#325918).
- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745 FATE#325918).
- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242 FATE#322914).
- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745 FATE#325918).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).
- bpf, devmap: Add missing bulk queue free (bsc#1109837).
- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).
- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).
- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bpf: Add missed newline in verifier verbose log (bsc#1056787).
- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf: fix use after free in bpf_evict_inode (bsc#1083647).
- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).
- bpf: sockmap fix msg sg.size account on ingress skb (bsc#1109837).
- bpf: sockmap remove duplicate queue free (bsc#1109837).
- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).
- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).
- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).
- brcmfmac: fix NULL pointer derefence during USB disconnect (bsc#1111666).
- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).
- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).
- brcmfmac: fix leak of mypkt on error return path (bsc#1111666).
- brcmfmac: fix missing checks for kmemdup (bsc#1051510).
- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).
- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).
- btrfs: Do not panic when we can't find a root key (bsc#1112063).
- btrfs: Factor out common delayed refs init code (bsc#1134813).
- btrfs: Introduce init_delayed_ref_head (bsc#1134813).
- btrfs: Open-code add_delayed_data_ref (bsc#1134813).
- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).
- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).
- btrfs: add a helper to return a head ref (bsc#1134813).
- btrfs: breakout empty head cleanup to a helper (bsc#1134813).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).
- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).
- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).
- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).
- btrfs: fix race updating log root item during fsync (bsc#1137153).
- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).
- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).
- btrfs: move all ref head cleanup to the helper function (bsc#1134813).
- btrfs: move extent_op cleanup to a helper (bsc#1134813).
- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).
- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Do not scan leaf if we're modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).
- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).
- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).
- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).
- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).
- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).
- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).
- btrfs: split delayed ref head initialization and addition (bsc#1134813).
- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).
- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).
- can: af_can: Fix error path of can_init() (bsc#1051510).
- can: flexcan: fix timeout when set small bitrate (bsc#1051510).
- can: purge socket error queue on sock destruct (bsc#1051510).
- carl9170: fix misuse of device driver API (bsc#1111666).
- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).
- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).
- ceph: factor out ceph_lookup_inode() (bsc#1138681).
- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).
- ceph: fix ci i_head_snapc leak (bsc#1122776).
- ceph: fix ci i_head_snapc leak (bsc#1122776).
- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).
- ceph: fix use-after-free on symlink traversal (bsc#1134459).
- ceph: fix use-after-free on symlink traversal (bsc#1134459).
- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).
- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).
- ceph: only use d_name directly when parent is locked (bsc#1134460).
- ceph: only use d_name directly when parent is locked (bsc#1134460).
- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).
- ceph: quota: fix quota subdir mounts (bsc#1138681).
- ceph: remove duplicated filelock ref increase (bsc#1138681).
- cfg80211: Handle WMM rules in regulatory domain intersection (bsc#1111666).
- cfg80211: fix memory leak of wiphy device name (bsc#1051510).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- cgroup: fix parsing empty mount option string (bsc#1133094).
- chardev: add additional check for minor range overlap (bsc#1051510).
- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).
- cifs: Fix potential OOB access of lock element array (bsc#1051510).
- cifs: don't dereference smb_file_target before null check (bsc#1051510).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).
- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Don't yell about bad mmc phases when getting (bsc#1051510).
- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).
- clk: rockchip: Turn on 'aclk_dmac1' for suspend on rk3288 (bsc#1051510).
- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).
- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).
- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).
- config: arm64: enable CN99xx uncore pmu References: bsc#1117114
- configfs: Fix use-after-free when accessing sd s_dentry (bsc#1051510).
- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).
- coresight: etb10: Fix handling of perf mode (bsc#1051510).
- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- cpu/speculation: Add 'mitigations=' cmdline option (bsc#1112178).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU doesn't support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).
- crypto: arm/aes-neonbs - don't access already-freed walk.iv (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: caam - add missing put_device() call (bsc#1129770).
- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).
- crypto: caam/qi2 - fix DMA mapping of stack memory (bsc#1111666).
- crypto: caam/qi2 - fix zero-length buffer DMA mapping (bsc#1111666).
- crypto: caam/qi2 - generate hash keys in-place (bsc#1111666).
- crypto: ccm - fix incompatibility between 'ccm' and 'ccm_base' (bsc#1051510).
- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).
- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).
- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix passing zero to 'PTR_ERR' warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Handle pci shutdown event (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - remove set but not used variable 'kctx_len' (bsc#1136353 jsc#SLE-4688).
- crypto: chelsio - remove set but not used variables 'adap' (bsc#1136353 jsc#SLE-4688).
- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).
- crypto: chtls - remove set but not used variables 'err, adap, request, hws' (bsc#1136353 jsc#SLE-4688).
- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).
- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).
- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).
- crypto: gcm - fix incompatibility between 'gcm' and 'gcm_base' (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).
- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).
- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).
- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).
- crypto: skcipher - don't WARN on unprocessed data after slow walk step (bsc#1051510).
- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- crypto: user - prevent operating on larval algorithms (bsc#1133401).
- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).
- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).
- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).
- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).
- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).
- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).
- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).
- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).
- cxgb4/cxgb4vf: Fix up netdev hw_features (bsc#1136345 jsc#SLE-4681).
- cxgb4/cxgb4vf: Link management changes (bsc#1127371).
- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).
- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).
- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).
- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).
- cxgb4: Add flag tc_flower_initialized (bsc#1127371).
- cxgb4: Add new T5 pci device id 0x50ae (bsc#1127371).
- cxgb4: Add new T5 pci device ids 0x50af and 0x50b0 (bsc#1127371).
- cxgb4: Add new T6 pci device ids 0x608a (bsc#1127371).
- cxgb4: Add new T6 pci device ids 0x608b (bsc#1136345 jsc#SLE-4681).
- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).
- cxgb4: Add support to read actual provisioned resources (bsc#1127371).
- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).
- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).
- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).
- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).
- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).
- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).
- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).
- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).
- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).
- cxgb4: Revert 'cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size' (bsc#1136345 jsc#SLE-4681).
- cxgb4: Support ethtool private flags (bsc#1127371).
- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).
- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).
- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).
- cxgb4: add support to display DCB info (bsc#1127371).
- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).
- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).
- cxgb4: collect hardware queue descriptors (bsc#1127371).
- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).
- cxgb4: convert flower table to use rhashtable (bsc#1127371).
- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).
- cxgb4: display number of rx and tx pages free (bsc#1127371).
- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).
- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).
- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).
- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).
- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).
- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).
- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).
- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).
- cxgb4: remove set but not used variables 'multitrc, speed' (bsc#1136345 jsc#SLE-4681).
- cxgb4: remove the unneeded locks (bsc#1127371).
- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).
- cxgb4: update supported DCB version (bsc#1127371).
- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).
- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).
- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Few more link management changes (bsc#1127374).
- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).
- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).
- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).
- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- dccp: Fix memleak in __feat_register_sp (bsc#1051510).
- debugfs: fix use-after-free on symlink traversal (bsc#1051510).
- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).
- device_cgroup: fix RCU imbalance in error case (bsc#1051510).
- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).
- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).
- dmaengine: axi-dmac: Don't check the number of frames for alignment (bsc#1051510).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).
- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).
- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).
- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).
- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).
- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).
- dmaengine: tegra210-adma: restore channel status (bsc#1111666).
- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).
- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).
- doc: Cope with the deprecation of AutoReporter (bsc#1051510).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: Add MDS vulnerability documentation (bsc#1135642).
- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).
- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).
- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).
- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).
- drivers/base: Introduce kill_device() (bsc#1139865).
- drivers/base: kABI fixes for struct device_private (bsc#1106383).
- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in 'rio_dma_transfer()' (bsc#1051510).
- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).
- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).
- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).
- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).
- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).
- drivers: thermal: tsens: Don't print error message on -EPROBE_DEFER (bsc#1051510).
- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).
- drm/amd/display: If one stream full updates, full update all planes (bsc#1111666).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/amd/display: Set stream mode_changed when connectors change (bsc#1111666).
- drm/amd/display: Use plane color_space for dpp if specified (bsc#1111666).
- drm/amd/display: extending AUX SW Timeout (bsc#1111666).
- drm/amd/display: fix cursor black issue (bsc#1111666).
- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).
- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/amdgpu/gmc9: fix VM_L2_CNTL3 programming (bsc#1111666).
- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).
- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).
- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).
- drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) (bsc#1111666).
- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).
- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).
- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).
- drm/doc: Drop 'content type' from the legacy kms property table (bsc#1111666).
- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).
- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).
- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).
- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).
- drm/etnaviv: lock MMU while dumping core (bsc#1113722)
- drm/exynos/mixer: fix MIXER shadow registry synchronisation code (bsc#1111666).
- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).
- drm/fb-helper: generic: Call drm_client_add() after setup is done (bsc#1111666).
- drm/fb-helper: generic: Don't take module ref for fbcon (bsc#1111666).
- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).
- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)
- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113956)
- drm/i915/gvt: Annotate iomem usage (bsc#1051510).
- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)
- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)
- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).
- drm/i915/gvt: Prevent use-after-free in ppgtt_free_all_spt() (bsc#1111666).
- drm/i915/gvt: Roundup fb height into tile's height at calucation fb size (bsc#1111666).
- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)
- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)
- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).
- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).
- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)
- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113956)
- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).
- drm/i915/gvt: refine ggtt range validation (bsc#1113722)
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/i915/icl: Whitelist GEN9_SLICE_COMMON_ECO_CHICKEN1 (bsc#1111666).
- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).
- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).
- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).
- drm/i915: Disable tv output on i9x5gm (bsc#1086657, bsc#1133897).
- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).
- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).
- drm/i915: Force 2*96 MHz cdclk on glk/cnl when audio power is enabled (bsc#1111666).
- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).
- drm/imx: don't skip DP channel disable for background plane (bsc#1051510).
- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).
- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).
- drm/lease: Make sure implicit planes are leased (bsc#1111666).
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)
- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113956)
- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).
- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).
- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).
- drm/mediatek: fix possible object reference leak (bsc#1051510).
- drm/mediatek: fix unbind functions (bsc#1111666).
- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).
- drm/meson: Add support for XBGR8888 ABGR8888 formats (bsc#1051510).
- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).
- drm/msm: fix fb references in async update (bsc#1111666).
- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).
- drm/nouveau/bar/tu104: initial support (bsc#1133593).
- drm/nouveau/bar/tu106: initial support (bsc#1133593).
- drm/nouveau/bios/tu104: initial support (bsc#1133593).
- drm/nouveau/bios/tu106: initial support (bsc#1133593).
- drm/nouveau/bios: translate additional memory types (bsc#1133593).
- drm/nouveau/bios: translate usb-C connector type (bsc#1133593).
- drm/nouveau/bus/tu104: initial support (bsc#1133593).
- drm/nouveau/bus/tu106: initial support (bsc#1133593).
- drm/nouveau/ce/tu104: initial support (bsc#1133593).
- drm/nouveau/ce/tu106: initial support (bsc#1133593).
- drm/nouveau/core: increase maximum number of nvdec instances to 3 (bsc#1133593).
- drm/nouveau/core: recognise TU102 (bsc#1133593).
- drm/nouveau/core: recognise TU104 (bsc#1133593).
- drm/nouveau/core: recognise TU106 (bsc#1133593).
- drm/nouveau/core: support multiple nvdec instances (bsc#1133593).
- drm/nouveau/devinit/gm200-: export function to upload+execute PMU/PRE_OS (bsc#1133593).
- drm/nouveau/devinit/tu104: initial support (bsc#1133593).
- drm/nouveau/devinit/tu106: initial support (bsc#1133593).
- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).
- drm/nouveau/disp/gm200-: add scdc parameter setter (bsc#1133593).
- drm/nouveau/disp/gv100: fix name of window channels in debug output (bsc#1133593).
- drm/nouveau/disp/tu104: initial support (bsc#1133593).
- drm/nouveau/disp/tu106: initial support (bsc#1133593).
- drm/nouveau/disp: add a way to configure scrambling/tmds for hdmi 2.0 (bsc#1133593).
- drm/nouveau/disp: add support for setting scdc parameters for high modes (bsc#1133593).
- drm/nouveau/disp: keep track of high-speed state, program into clock (bsc#1133593).
- drm/nouveau/disp: take sink support into account for exposing 594mhz (bsc#1133593).
- drm/nouveau/dma/tu104: initial support (bsc#1133593).
- drm/nouveau/dma/tu106: initial support (bsc#1133593).
- drm/nouveau/drm/nouveau: Do not forget to label dp_aux devices (bsc#1133593).
- drm/nouveau/drm/nouveau: s/nouveau_backlight_exit/nouveau_backlight_fini/ (bsc#1133593).
- drm/nouveau/drm/nouveau: tegra: Call nouveau_drm_device_init() (bsc#1133593).
- drm/nouveau/fault/tu104: initial support (bsc#1133593).
- drm/nouveau/fault/tu106: initial support (bsc#1133593).
- drm/nouveau/fault: add explicit control over fault buffer interrupts (bsc#1133593).
- drm/nouveau/fault: remove manual mapping of fault buffers into BAR2 (bsc#1133593).
- drm/nouveau/fault: store get/put pri address in nvkm_fault_buffer (bsc#1133593).
- drm/nouveau/fb/tu104: initial support (bsc#1133593).
- drm/nouveau/fb/tu106: initial support (bsc#1133593).
- drm/nouveau/fifo/gf100-: call into BAR to reset BARs after MMU fault (bsc#1133593).
- drm/nouveau/fifo/gk104-: group pbdma functions together (bsc#1133593).
- drm/nouveau/fifo/gk104-: return channel instance in ctor args (bsc#1133593).
- drm/nouveau/fifo/gk104-: separate runlist building from committing to hw (bsc#1133593).
- drm/nouveau/fifo/gk104-: support enabling privileged ce functions (bsc#1133593).
- drm/nouveau/fifo/gk104-: virtualise pbdma enable function (bsc#1133593).
- drm/nouveau/fifo/gm200-: read pbdma count more directly (bsc#1133593).
- drm/nouveau/fifo/gv100: allocate method buffer (bsc#1133593).
- drm/nouveau/fifo/gv100: return work submission token in channel ctor args (bsc#1133593).
- drm/nouveau/fifo/tu104: initial support (bsc#1133593).
- drm/nouveau/fifo/tu106: initial support (bsc#1133593).
- drm/nouveau/fuse/tu104: initial support (bsc#1133593).
- drm/nouveau/fuse/tu106: initial support (bsc#1133593).
- drm/nouveau/gpio/tu104: initial support (bsc#1133593).
- drm/nouveau/gpio/tu106: initial support (bsc#1133593).
- drm/nouveau/i2c/tu104: initial support (bsc#1133593).
- drm/nouveau/i2c/tu106: initial support (bsc#1133593).
- drm/nouveau/i2c: Disable i2c bus access after fini() (bsc#1113722)
- drm/nouveau/i2c: Enable i2c pads busses during preinit (bsc#1051510).
- drm/nouveau/ibus/tu104: initial support (bsc#1133593).
- drm/nouveau/ibus/tu106: initial support (bsc#1133593).
- drm/nouveau/imem/nv50: support pinning objects in BAR2 and returning address (bsc#1133593).
- drm/nouveau/imem/tu104: initial support (bsc#1133593).
- drm/nouveau/imem/tu106: initial support (bsc#1133593).
- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).
- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).
- drm/nouveau/kms/nv50-: allow more flexibility with lut formats (bsc#1133593).
- drm/nouveau/kms/tu104: initial support (bsc#1133593).
- drm/nouveau/ltc/tu104: initial support (bsc#1133593).
- drm/nouveau/ltc/tu106: initial support (bsc#1133593).
- drm/nouveau/mc/tu104: initial support (bsc#1133593).
- drm/nouveau/mc/tu106: initial support (bsc#1133593).
- drm/nouveau/mmu/tu104: initial support (bsc#1133593).
- drm/nouveau/mmu/tu106: initial support (bsc#1133593).
- drm/nouveau/mmu: add more general vmm free/node handling functions (bsc#1133593).
- drm/nouveau/pci/tu104: initial support (bsc#1133593).
- drm/nouveau/pci/tu106: initial support (bsc#1133593).
- drm/nouveau/pmu/tu104: initial support (bsc#1133593).
- drm/nouveau/pmu/tu106: initial support (bsc#1133593).
- drm/nouveau/therm/tu104: initial support (bsc#1133593).
- drm/nouveau/therm/tu106: initial support (bsc#1133593).
- drm/nouveau/tmr/tu104: initial support (bsc#1133593).
- drm/nouveau/tmr/tu106: initial support (bsc#1133593).
- drm/nouveau/top/tu104: initial support (bsc#1133593).
- drm/nouveau/top/tu106: initial support (bsc#1133593).
- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).
- drm/nouveau: Add NV_PRINTK_ONCE and variants (bsc#1133593).
- drm/nouveau: Add size to vbios.rom file in debugfs (bsc#1133593).
- drm/nouveau: Add strap_peek to debugfs (bsc#1133593).
- drm/nouveau: Cleanup indenting in nouveau_backlight.c (bsc#1133593).
- drm/nouveau: Fix potential memory leak in nouveau_drm_load() (bsc#1133593).
- drm/nouveau: Move backlight device into nouveau_connector (bsc#1133593).
- drm/nouveau: Refactor nvXX_backlight_init() (bsc#1133593).
- drm/nouveau: Remove unecessary dma_fence_ops (bsc#1133593).
- drm/nouveau: Start using new drm_dev initialization helpers (bsc#1133593).
- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).
- drm/nouveau: add DisplayPort CEC-Tunneling-over-AUX support (bsc#1133593).
- drm/nouveau: register backlight on pascal and newer (bsc#1133593).
- drm/nouveau: remove left-over struct member (bsc#1133593).
- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).
- drm/omap: hdmi4_cec: Fix CEC clock handling for PM (bsc#1111666).
- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).
- drm/panel: panel-innolux: set display off in innolux_panel_unprepare (bsc#1111666).
- drm/pl111: Initialize clock spinlock early (bsc#1111666).
- drm/pl111: fix possible object reference leak (bsc#1111666).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm/radeon: prefer lower reference dividers (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/rockchip: fix for mailbox read validation (bsc#1051510).
- drm/rockchip: fix for mailbox read validation (bsc#1111666).
- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).
- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)
- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)
- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)
- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).
- drm/sun4i: Fix sun8i HDMI PHY configuration for 148.5 MHz (bsc#1111666).
- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)
- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)
- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).
- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).
- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)
- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in sun8i_tcon_top_un/bind (bsc#1111666).
- drm/tegra: gem: Fix CPU-cache maintenance for BO's allocated using get_pages() (bsc#1111666).
- drm/tegra: hub: Fix dereference before check (bsc#1111666).
- drm/ttm: Fix bo_global and mem_global kfree error (bsc#1111666).
- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)
- drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/udl: add a release method and delay modeset teardown (bsc#1085536)
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/v3d: Handle errors from IRQ setup (bsc#1111666).
- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/vmwgfx: Don't send drm sysfs hotplug events on initial master set (bsc#1051510).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)
- drm/vmwgfx: Remove set but not used variable 'restart' (bsc#1111666).
- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).
- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).
- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).
- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).
- drm: Fix drm_release() and device unplug (bsc#1111666).
- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).
- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).
- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).
- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).
- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)
- drm: don't block fb changes for async plane updates (bsc#1111666).
- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).
- drm: rcar-du: Fix rcar_du_crtc structure documentation (bsc#1111666).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- drm_dp_cec: add note about good MegaChips 2900 CEC support (bsc#1136978).
- drm_dp_cec: check that aux has a transfer function (bsc#1136978).
- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).
- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).
- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).
- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).
- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).
- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).
- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).
- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).
- efi/arm: Revert 'Defer persistent reservations until after paging_init()' (bsc#1117158).
- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).
- efi/arm: libstub: add a root memreserve config table (bsc#1117158).
- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).
- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).
- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).
- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).
- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).
- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).
- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).
- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).
- ext4: Do not warn when enabling DAX (bsc#1132894).
- ext4: actually request zeroing of inode table after grow (bsc#1135315).
- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).
- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).
- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).
- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).
- ext4: make sanity check in mballoc more strict (bsc#1136439).
- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).
- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).
- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).
- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).
- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)
- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).
- fix cgroup_do_mount() handling of failure exits (bsc#1133095).
- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).
- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).
- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).
- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).
- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712)
- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).
- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).
- fuse: fallocate: fix return with locked inode (bsc#1051510).
- fuse: fix writepages on 32bit (bsc#1051510).
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).
- futex: Cure exit race (bsc#1050549).
- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).
- futex: Handle early deadlock return correctly (bsc#1050549).
- genirq: Prevent use-after-free and work list corruption (bsc#1051510).
- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).
- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).
- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).
- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).
- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).
- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).
- gpio: fix gpio-adp5588 build errors (bsc#1051510).
- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).
- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- hid: i2c-hid: Ignore input report if there's no data present on Elan touchpanels (bsc#1133486).
- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).
- hwmon: (core) add thermal sensors only if dev of_node is present (bsc#1051510).
- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).
- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).
- hwrng: omap - Set default quality (bsc#1051510).
- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).
- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).
- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).
- i2c: imx: correct the method of getting private data in notifier_call (bsc#1111666).
- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).
- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).
- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).
- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).
- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).
- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).
- i2c: synquacer: fix enumeration of slave devices (bsc#1111666).
- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).
- ib/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).
- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).
- ibmvnic: Add device identification to requested IRQs (bsc#1137739).
- ibmvnic: Do not close unopened driver during reset (bsc#1137752).
- ibmvnic: Enable GRO (bsc#1132227).
- ibmvnic: Fix completion structure initialization (bsc#1131659).
- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).
- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).
- ibmvnic: Refresh device multicast list after reset (bsc#1137752).
- ibmvnic: remove set but not used variable 'netdev' (bsc#1137739).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).
- iio: Fix scan mask selection (bsc#1051510).
- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).
- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).
- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).
- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).
- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).
- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).
- iio: core: fix a possible circular locking dependency (bsc#1051510).
- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).
- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).
- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).
- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).
- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).
- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).
- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).
- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- intel_th: pci: Add Comet Lake support (bsc#1051510).
- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/amd: Set exclusion range correctly (bsc#1130425).
- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).
- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).
- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).
- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).
- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).
- ipmi: Prevent use-after-free in deliver_response (bsc#1111666).
- ipmi: fix sleep-in-atomic in free_user at cleanup SRCU user release_barrier (bsc#1111666).
- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).
- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).
- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).
- ipvlan: Add the skb mark as flow4's member to lookup route (bsc#1051510).
- ipvlan: fix ipv6 outbound device (bsc#1051510).
- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).
- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).
- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Don't clear eventid when freeing an MSI (bsc#1051510).
- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).
- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).
- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).
- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).
- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: correct one of the PCI struct names (bsc#1111666).
- iwlwifi: don't WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: fix driver operation for 5350 (bsc#1111666).
- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).
- iwlwifi: pcie: don't crash on invalid RX interrupt (bsc#1051510).
- iwlwifi: pcie: don't service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).
- jbd2: check superblock mapped prior to committing (bsc#1136430).
- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kABI workaround for asus-wmi changes (bsc#1051510).
- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).
- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).
- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).
- kABI: protect functions using struct net_generic (bsc#1129845 LTC#176252).
- kABI: protect struct smc_ib_device (bsc#1129845 LTC#176252).
- kABI: protect struct smcd_dev (bsc#1129845 LTC#176252).
- kabi fixup blk_mq_register_dev() (bsc#1140637).
- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).
- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).
- kabi/severities: exclude hns3 symbols (bsc#1134948)
- kabi/severities: exclude qed* symbols (bsc#1136461)
- kabi/severities: exclude qed* symbols (bsc#1136461)
- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).
- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).
- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).
- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).
- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).
- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).
- kcm: switch order of device registration to fix a crash (bnc#1130527).
- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).
- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).
- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).
- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kernfs: do not set dentry d_fsdata (boo#1133115).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).
- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).
- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).
- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).
- kvm: VMX: Compare only a single byte for VMCS' 'launched' in vCPU-run (bsc#1132555).
- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).
- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).
- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).
- kvm: nVMX: Sign extend displacements of VMX instr's mem operands (bsc#1132562).
- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222
- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: s390: use created_vcpus in more places (bsc#1136206).
- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).
- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).
- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).
- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).
- kvm: x86: Include CPUID leaf 0x8000001e in kvm's supported CPUID (bsc#1114279).
- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).
- kvm: x86: Report STibP on GET_SUPPORTED_CPUID (bsc#1111331).
- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- kvm: x86: fix return value for reserved EFER (bsc#1140992).
- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).
- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).
- l2tp: revert 'l2tp: fix missing print session offset info' (bsc#1051510).
- leds: avoid flush_work in atomic context (bsc#1051510).
- leds: avoid races with workqueue (bsc#1051510).
- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- lib/scatterlist: Fix mapping iterator when sg offset is greater than PAGE_SIZE (bsc#1051510).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: add crc64 calculation routines (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- lib: do not depend on linux headers being installed (bsc#1130972).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).
- libata: fix using DMA buffers on stack (bsc#1051510).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).
- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).
- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- lightnvm: if LUNs are already allocated fix return (bsc#1085535).
- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).
- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).
- livepatch: Remove custom kobject state handling (bsc#1071995).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).
- livepatch: Remove duplicated code for early initialization (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).
- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).
- mISDN: Check address length before reading address family (bsc#1051510).
- mISDN: make sure device name is NUL terminated (bsc#1051510).
- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).
- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).
- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).
- mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode (bsc#1111666).
- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: don't attempt to rename ERR_PTR() debugfs dirs (bsc#1111666).
- mac80211: drop robust management frames from unknown TA (bsc#1051510).
- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- mac8390: Fix mmio access size probe (bsc#1051510).
- md: batch flush requests (bsc#1119680).
- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).
- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).
- media: au0828: stop video streaming only when last user stops (bsc#1051510).
- media: coda: clear error return value before picture run (bsc#1051510).
- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).
- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).
- media: cx23885: check allocation return (bsc#1051510).
- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).
- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).
- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).
- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).
- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).
- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).
- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).
- media: ov2659: make S_FMT succeed even if requested format doesn't match (bsc#1051510).
- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).
- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: saa7146: avoid high stack usage with clang (bsc#1051510).
- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).
- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).
- media: smsusb: better handle optional alignment (bsc#1051510).
- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).
- media: usb: siano: Fix false-positive 'uninitialized variable' warning (bsc#1051510).
- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).
- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).
- media: v4l2: Test type instead of cfg type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- media: vivid: use vfree() instead of kfree() for dev bitmap_cap (bsc#1051510).
- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).
- media: wl128x: prevent two potential buffer overflows (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memcg: make it work on sparse non-0-node systems (bnc#1133616).
- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).
- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).
- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).
- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).
- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).
- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).
- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).
- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).
- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).
- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).
- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm/debug.c: fix __dump_page when mapping host is not set (bsc#1131934).
- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).
- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).
- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).
- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)
- mm: fix race on soft-offlining free huge pages (bsc#1139712).
- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712).
- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712).
- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712).
- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712).
- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712)
- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712).
- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712).
- mm: hwpoison: introduce idenfity_page_state (bsc#1139712).
- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mm: soft-offline: close the race against page allocation (bsc#1139712).
- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712).
- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- mmc: bcm2835 MMC issues (bsc#1070872).
- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).
- mmc: core: Fix tag set memory leak (bsc#1111666).
- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).
- mmc: core: Verify SD bus width (bsc#1051510).
- mmc: core: complete HS400 before checking status (bsc#1111666).
- mmc: core: fix possible use after free of host (bsc#1051510).
- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).
- mmc: davinci: remove extraneous __init annotation (bsc#1051510).
- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).
- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).
- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).
- mmc: sdhci: Handle auto-command errors (bsc#1051510).
- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).
- mmc: tmio_mmc_core: don't claim spurious interrupts (bsc#1051510).
- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).
- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).
- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).
- mt7601u: bump supported EEPROM version (bsc#1051510).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- mtd: docg3: Fix passing zero to 'PTR_ERR' warning in doc_probe_device (bsc#1051510).
- mtd: docg3: fix a possible memory leak of mtd name (bsc#1051510).
- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).
- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).
- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).
- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).
- mwifiex: Make resume actually do something useful again on SDIO cards (bsc#1111666).
- mwifiex: don't advertise IBSS features without FW support (bsc#1129770).
- mwifiex: prevent an array overflow (bsc#1051510).
- mwl8k: Fix rate_idx underflow (bsc#1051510).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net/ibmvnic: Remove tests of member address (bsc#1137739).
- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).
- net/ibmvnic: Update carrier state after link state change (bsc#1135100).
- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).
- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).
- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).
- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).
- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).
- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).
- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).
- net/mlx5e: Fix trailing semicolon (bsc#1075020).
- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).
- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).
- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).
- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).
- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).
- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).
- net/sched: don't dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).
- net/sched: don't dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).
- net/smc: add pnet table namespace support (bsc#1129845 LTC#176252).
- net/smc: add smcd support to the pnet table (bsc#1129845 LTC#176252).
- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1129845 LTC#176252).
- net/smc: allow pnetid-less configuration (bsc#1129845 LTC#176252).
- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).
- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1129845 LTC#176252).
- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).
- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).
- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).
- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).
- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).
- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).
- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).
- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).
- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).
- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).
- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).
- net/smc: return booleans instead of integers (bsc#1096003, FATE#325023, LTC#164003).
- net/smc: rework pnet table (bsc#1129845 LTC#176252).
- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).
- net/tls: avoid NULL pointer deref on nskb sk in fallback (bsc#1109837).
- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).
- net/tls: don't copy negative amounts of data in reencrypt (bsc#1109837).
- net/tls: don't ignore netdev notifications if no TLS features (bsc#1109837).
- net/tls: don't leak IV and record seq when offload fails (bsc#1109837).
- net/tls: don't leak partially sent record in device mode (bsc#1109837).
- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).
- net/tls: fix copy to fragments in reencrypt (bsc#1109837).
- net/tls: fix page double free on TX cleanup (bsc#1109837).
- net/tls: fix refcount adjustment in fallback (bsc#1109837).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: fix state removal with feature flags off (bsc#1109837).
- net/tls: fix the IV leaks (bsc#1109837).
- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).
- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).
- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).
- net: Fix missing meta data in skb with vlan packet (bsc#1109837).
- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).
- net: core: support XDP generic on stacked devices (bsc#1109837).
- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).
- net: don't clear sock sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).
- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).
- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).
- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).
- net: ena: add good checksum counter (bsc#1138879).
- net: ena: add handling of llq max tx burst size (bsc#1138879).
- net: ena: add newline at the end of pr_err prints (bsc#1138879).
- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).
- net: ena: allow automatic fallback to polling mode (bsc#1138879).
- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).
- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).
- net: ena: enable negotiating larger Rx ring size (bsc#1138879).
- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).
- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).
- net: ena: fix incorrect test of supported hash function (bsc#1138879).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).
- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).
- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).
- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).
- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).
- net: ena: gcc 8: fix compilation warning (bsc#1138879).
- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).
- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).
- net: ena: optimise calculations for CQ doorbell (bsc#1138879).
- net: ena: remove inline keyword from functions in *.c (bsc#1138879).
- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).
- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).
- net: ena: use dev_info_once instead of static variable (bsc#1138879).
- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).
- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).
- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).
- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).
- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).
- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).
- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).
- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).
- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).
- net: hns3: add queue's statistics update to service task (bsc#1104353 bsc#1134981).
- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).
- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).
- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).
- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).
- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).
- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).
- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).
- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).
- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).
- net: hns3: code optimization for command queue' spin lock (bsc#1104353 bsc#1135042).
- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).
- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).
- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).
- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).
- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).
- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).
- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).
- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).
- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).
- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).
- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).
- net: hns3: fix for vport bw_limit overflow problem (bsc#1104353 bsc#1134998).
- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).
- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).
- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).
- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).
- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).
- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).
- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).
- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).
- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).
- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).
- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).
- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).
- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).
- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).
- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).
- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).
- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).
- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).
- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).
- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).
- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).
- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).
- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).
- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).
- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).
- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).
- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).
- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).
- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).
- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).
- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).
- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).
- net: hns3: use atomic_t replace u32 for arq's count (bsc#1104353 bsc#1134953).
- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).
- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).
- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).
- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).
- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).
- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).
- net: smc_close: mark expected switch fall-through (bsc#1096003, FATE#325023, LTC#164003).
- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).
- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).
- net: use indirect call wrappers at GRO network layer (bsc#1124503).
- net: use indirect call wrappers at GRO transport layer (bsc#1124503).
- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).
- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).
- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).
- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).
- nfs: Fix dentry revalidation on nfsv4 lookup (bsc#1132618).
- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).
- nl80211: fix station_info pertid memory leak (bsc#1051510).
- nvme-fc: use separate work queue to avoid warning (bsc#1131673).
- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).
- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1130937).
- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).
- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).
- nvme: Do not remove namespaces during reset (bsc#1131673).
- nvme: add proper discard setup for the multipath device (bsc#1114638).
- nvme: copy MTFA field from identify controller (bsc#1140715).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvme: fix the dangerous reference of namespaces list (bsc#1131673).
- nvme: flush scan_work when resetting controller (bsc#1131673).
- nvme: make sure ns head inherits underlying device limits (bsc#1131673).
- nvme: only reconfigure discard if necessary (bsc#1114638).
- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).
- nvmem: Don't let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).
- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).
- nvmem: core: fix read buffer in place (bsc#1051510).
- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).
- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).
- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).
- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).
- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).
- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).
- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).
- nvmem: imx-ocotp: Update module description (bsc#1051510).
- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).
- objtool: Fix function fallthrough detection (bsc#1058115).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).
- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).
- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).
- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).
- openvswitch: add seqadj extension when NAT is used (bsc#1051510).
- openvswitch: fix flow actions reallocation (bsc#1051510).
- overflow: Fix -Wtype-limits compilation warnings (bsc#1111666).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54: drop device reference count if fails to enable device (bsc#1135642).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).
- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).
- pci/aer: Use cached AER Capability offset (bsc#1142623).
- pci/p2pdma: Fix missing check for dma_virt_ops (bsc#1111666).
- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- pci/portdrv: Consolidate comments (bsc#1142623).
- pci/portdrv: Disable port driver in compat mode (bsc#1142623).
- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).
- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- pci: Init PCIe feature bits for managed host bridge alloc (bsc#1111666).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: pciehp: Convert to threaded IRQ (bsc#1133005).
- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).
- pci: pciehp: Tolerate Presence Detect hardwired to zero (bsc#1133016).
- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).
- perf/x86/amd: Add event map for AMD Family 17h (bsc#1134223).
- perf/x86/amd: Update generic hardware cache events for Family 17h (bsc#1134223).
- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).
- phy: sun4i-usb: Support set_mode to USB_HOST for non-OTG PHYs (bsc#1051510).
- pinctrl/amd: add get_direction handler (bsc#1140463).
- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).
- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).
- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).
- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).
- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).
- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).
- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).
- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).
- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).
- platform/x86: intel_punit_ipc: Revert 'Fix resource ioremap warning' (bsc#1051510).
- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).
- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).
- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).
- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).
- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).
- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).
- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).
- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).
- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).
- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).
- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).
- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).
- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).
- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).
- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).
- platform/x86: mlx-platform: Remove unused define (bsc#1112374).
- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).
- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).
- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).
- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).
- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).
- pm: acpi/PCI: Resume all devices during hibernation (bsc#1111666).
- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).
- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).
- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).
- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).
- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).
- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).
- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).
- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).
- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).
- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).
- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, fate#323286, git-fixes).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, fate#323286, git-fixes).
- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Check secondary hash page table (bsc#1065729).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, fate#323286, git-fixes).
- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).
- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).
- powerpc/numa: improve control of topology updates (bsc#1133584).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).
- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).
- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).
- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).
- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).
- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).
- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).
- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).
- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).
- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).
- powerpc/powernv: Don't reprogram SLW image on every KVM guest entry/exit (bsc#1061840).
- powerpc/powernv: Make opal log only readable by root (bsc#1065729).
- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).
- powerpc/process: Fix sparse address space warnings (bsc#1065729).
- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).
- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).
- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).
- powerpc/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).
- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).
- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).
- powerpc: Fix 32-bit KVM-PR lockup and host crash with MacOS guest (bsc#1061840).
- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).
- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).
- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: mppe: Add softdep to arc4 (bsc#1088047).
- proc/kcore: don't bounds check against address 0 (bsc#1051510).
- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).
- proc: revalidate kernel thread inodes to root:root (bsc#1051510).
- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).
- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).
- pwm: meson: Don't disable PWM when setting duty repeatedly (bsc#1051510).
- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).
- pwm: stm32: Use 3 cells of_xlate() (bsc#1111666).
- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the DORQ's attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'faspath' 'fastpath' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: fix spelling mistake 'inculde' 'include' (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: fix write to free'd pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128971).
- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).
- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).
- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).
- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).
- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).
- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).
- qlcnic: remove set but not used variables 'cur_rings, max_hw_rings, tx_desc_info' (bsc#1136469 jsc#SLE-4695).
- qlcnic: remove set but not used variables 'op, cmd_op' (bsc#1136469 jsc#SLE-4695).
- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- qmi_wwan: add Olicard 600 (bsc#1051510).
- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).
- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).
- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).
- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).
- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).
- rdma/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).
- rdma/cxgb4: Add support for kernel mode SRQ's (bsc#1127371).
- rdma/cxgb4: Add support for srq functions and structs (bsc#1127371).
- rdma/cxgb4: Don't expose DMA addresses (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Fix spelling mistake 'immedate' 'immediate' (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).
- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).
- rdma/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).
- rdma/cxgb4: fix some info leaks (bsc#1127371).
- rdma/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).
- rdma/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).
- rdma/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).
- rdma/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).
- rdma/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).
- rdma/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).
- rdma/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).
- rdma/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).
- rdma/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).
- rdma/hns: Fix the chip hanging caused by sending mailbox CMQ during reset (bsc#1104427 bsc#1137232).
- rdma/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).
- rdma/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).
- rdma/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).
- rdma/hns: Make some function static (bsc#1104427 bsc#1126206).
- rdma/hns: Modify qp specification according to UM (bsc#1104427 bsc#1137233).
- rdma/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).
- rdma/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).
- rdma/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).
- rdma/hns: Remove set but not used variable 'rst' (bsc#1104427 bsc#1126206).
- rdma/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).
- rdma/hns: Update CQE specifications (bsc#1104427 bsc#1137236).
- rdma/hns: rdma/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).
- rdma/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).
- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).
- rdma/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).
- rdma/qedr: Fix incorrect device rate (bsc#1136188).
- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).
- rdma/smc: Replace ib_query_gid with rdma_get_gid_attr (bsc#1131530 LTC#176717).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).
- ring-buffer: Check if memory is available before allocation (bsc#1132531).
- rpm/post.sh: correct typo in err msg (bsc#1137625)
- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).
- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).
- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).
- rtc: don't reference bogus function pointer in kdoc (bsc#1051510).
- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).
- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).
- rtlwifi: fix potential NULL pointer dereference (bsc#1111666).
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).
- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/dasd: fix panic for failed online processing (bsc#1132589).
- s390/dasd: fix using offset into zero size array error (bsc#1051510).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/jump_label: Use 'jdd' constraint on gcc9 (bsc#1138589).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).
- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).
- s390/qeth: fix race when initializing the IP address table (bsc#1051510).
- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- s390/setup: fix early warning messages (bsc#1051510).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).
- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).
- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).
- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).
- sc16is7xx: move label 'err_spi' to correct section (bsc#1051510).
- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).
- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).
- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).
- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).
- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: fix spelling mistake 'Retreiving' 'Retrieving' (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).
- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).
- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).
- scsi: csiostor: Remove set but not used variable 'pln' (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).
- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi: hisi: KABI ignore new symbols (bsc#1135038).
- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).
- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).
- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).
- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).
- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).
- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).
- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).
- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).
- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).
- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).
- scsi: hisi_sas: add host reset interface for test (bsc#1135041).
- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).
- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).
- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).
- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).
- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).
- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).
- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).
- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).
- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).
- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).
- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).
- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).
- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).
- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).
- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).
- scsi: megaraid_sas: correct an info message (bsc#1136271).
- scsi: megaraid_sas: driver version update (bsc#1136271).
- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).
- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add additional checks for io_req sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fixup bit operations (bsc#1135542).
- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).
- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Fix spelling mistake 'OUSTANDING' 'OUTSTANDING' (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).
- scsi: qedi: remove set but not used variables 'cdev' and 'udev' (jsc#SLE-4693 bsc#1136462).
- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).
- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).
- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).
- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).
- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).
- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).
- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).
- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).
- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).
- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).
- scsi: qla2xxx: Avoid pci IRQ affinity mapping when multiqueue is not supported (bsc#1136215).
- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).
- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).
- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).
- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).
- scsi: qla2xxx: Declare local functions 'static' (bsc#1137444).
- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).
- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).
- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).
- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).
- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).
- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).
- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).
- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).
- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).
- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).
- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).
- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).
- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).
- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).
- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).
- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).
- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes 'res' (bsc#1137444).
- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).
- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).
- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).
- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).
- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).
- scsi: qla2xxx: Remove FW default template (bsc#1136215).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).
- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).
- scsi: qla2xxx: Remove unused symbols (bsc#1118139).
- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).
- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).
- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).
- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).
- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).
- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).
- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).
- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).
- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).
- scsi: qla2xxx: avoid printf format warning (bsc#1136215).
- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).
- scsi: qla2xxx: fix spelling mistake: 'existant' - 'existent' (bsc#1118139).
- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).
- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).
- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).
- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).
- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- scsi: smartpqi: Add retries for device reset (bsc#1133547).
- scsi: smartpqi: Reporting 'logical unit failure' (bsc#1133547).
- scsi: smartpqi: add H3C controller IDs (bsc#1133547).
- scsi: smartpqi: add h3c ssid (bsc#1133547).
- scsi: smartpqi: add no_write_same for logical volumes (bsc#1133547).
- scsi: smartpqi: add ofa support (bsc#1133547).
- scsi: smartpqi: add smp_utils support (bsc#1133547).
- scsi: smartpqi: add spdx (bsc#1133547).
- scsi: smartpqi: add support for PQI Config Table handshake (bsc#1133547).
- scsi: smartpqi: add support for huawei controllers (bsc#1133547).
- scsi: smartpqi: add sysfs attributes (bsc#1133547).
- scsi: smartpqi: allow for larger raid maps (bsc#1133547).
- scsi: smartpqi: bump driver version (bsc#1133547).
- scsi: smartpqi: bump driver version (bsc#1133547).
- scsi: smartpqi: call pqi_free_interrupts() in pqi_shutdown() (bsc#1133547).
- scsi: smartpqi: check for null device pointers (bsc#1133547).
- scsi: smartpqi: correct host serial num for ssa (bsc#1133547).
- scsi: smartpqi: correct lun reset issues (bsc#1133547).
- scsi: smartpqi: correct volume status (bsc#1133547).
- scsi: smartpqi: do not offline disks for transient did no connect conditions (bsc#1133547).
- scsi: smartpqi: enhance numa node detection (bsc#1133547).
- scsi: smartpqi: fix build warnings (bsc#1133547).
- scsi: smartpqi: fix disk name mount point (bsc#1133547).
- scsi: smartpqi: fully convert to the generic DMA API (bsc#1133547).
- scsi: smartpqi: increase LUN reset timeout (bsc#1133547).
- scsi: smartpqi: increase fw status register read timeout (bsc#1133547).
- scsi: smartpqi: refactor sending controller raid requests (bsc#1133547).
- scsi: smartpqi: turn off lun data caching for ptraid (bsc#1133547).
- scsi: smartpqi: update copyright (bsc#1133547).
- scsi: smartpqi: update driver version (bsc#1133547).
- scsi: smartpqi: wake up drives after os resumes from suspend (bsc#1133547).
- scsi: smartpqi_init: fix boolean expression in pqi_device_remove_start (bsc#1133547).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).
- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).
- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).
- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).
- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).
- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).
- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).
- serial: sh-sci: disable DMA for uart_console (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- serial: uartps: console_setup() can't be placed to init section (bsc#1051510).
- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).
- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).
- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).
- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).
- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).
- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).
- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).
- spi-mem: fix kernel-doc for spi_mem_dirmap_{read|write}() (bsc#1111666).
- spi: Add missing pm_runtime_put_noidle() after failed get (bsc#1111666).
- spi: Fix zero length xfer bug (bsc#1051510).
- spi: Micrel eth switch: declare missing of table (bsc#1051510).
- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).
- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).
- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).
- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).
- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).
- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).
- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).
- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).
- spi: tegra114: reset controller on probe (bsc#1051510).
- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).
- staging: comedi: ni_usb6501: Fix possible double-free of usb_rx_buf (bsc#1051510).
- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).
- staging: comedi: vmk80xx: Fix possible double-free of usb_rx_buf (bsc#1051510).
- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).
- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).
- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).
- staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc (bsc#1111666).
- staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference (bsc#1111666).
- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).
- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510).
- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).
- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- stm class: Fix an endless loop in channel allocation (bsc#1051510).
- stm class: Fix channel free in stm output free path (bsc#1051510).
- stm class: Prevent division by zero (bsc#1051510).
- supported.conf: Add cls_bpf, sch_ingress to kernel-default-base (bsc#1134743).
- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).
- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).
- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)
- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).
- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).
- svm: Fix AVIC DFR and LDR handling (bsc#1132558).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).
- sysctl: handle overflow for file-max (bsc#1051510).
- sysctl: handle overflow in proc_get_long (bsc#1051510).
- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).
- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).
- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: limit payload size of sacked skbs (bsc#1137586).
- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).
- team: Always enable vlan tx offload (bsc#1051510).
- team: set slave to promisc if team is already in promisc mode (bsc#1051510).
- testing: nvdimm: provide SZ_4G constant (bsc#1132982).
- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).
- thermal/int340x_thermal: fix mode setting (bsc#1051510).
- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).
- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).
- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).
- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).
- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).
- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: fix infinite loop in map create (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).
- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).
- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).
- tracing: Fix buffer_ref pipe ops (bsc#1133698).
- tracing: Fix partial reading of trace event's id file (bsc#1136573).
- treewide: Use DEVICE_ATTR_WO (bsc#1137739).
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).
- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).
- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).
- tty: max310x: Fix external crystal register setup (bsc#1051510).
- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).
- tty: serial_core, add install (bnc#1129693).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).
- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).
- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).
- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).
- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bsc#1051510).
- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).
- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).
- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).
- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300 ep[i] (bsc#1051510).
- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).
- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).
- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: u132-hcd: fix resource leak (bsc#1051510).
- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).
- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).
- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).
- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).
- usbnet: fix kernel crash after disconnect (bsc#1051510).
- usbnet: ipheth: fix racing condition (bsc#1051510).
- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).
- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).
- vfio/pci: use correct format characters (bsc#1051510).
- vfio: ccw: only free cp on final interrupt (bsc#1051510).
- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).
- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).
- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).
- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).
- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).
- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).
- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).
- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).
- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).
- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).
- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).
- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).
- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).
- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).
- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).
- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).
- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).
- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).
- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).
- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).
- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).
- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).
- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).
- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).
- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).
- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).
- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio: Honour 'may_reduce_num' in vring_create_virtqueue (bsc#1051510).
- virtio_console: initialize vtermno value for ports (bsc#1051510).
- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).
- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).
- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).
- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).
- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).
- vsock/virtio: reset connected sockets on device removal (bsc#1051510).
- vt: always call notifier with the console lock held (bsc#1051510).
- vxlan: trivial indenting fix (bsc#1051510).
- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).
- w1: fix the resume command API (bsc#1051510).
- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).
- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix return code of wmi_mgmt_tx and wmi_mgmt_tx_ext (bsc#1111666).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor (bsc#1114279).
- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and pciE SMCA bank types (bsc#1128415).
- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).
- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).
- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).
- x86/PCI: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318).
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).
- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).
- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).
- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).
- x86/mce: Handle varying MCA bank counts (bsc#1128415).
- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).
- x86/microcode: Fix microcode hotplug state (bsc#1114279).
- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).
- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/perf/amd: Remove need to check 'running' bit in NMI handler (bsc#1131438).
- x86/perf/amd: Resolve NMI latency issues for active PMCs (bsc#1131438).
- x86/perf/amd: Resolve race condition when disabling PMC (bsc#1131438).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Fix documentation typo (bsc#1135642).
- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).
- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).
- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).
- x86/speculation: Support 'mitigations=' cmdline option (bsc#1112178).
- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).
- x86/umip: Make the UMIP activated message generic (bsc#1138336).
- x86/umip: Print UMIP line only once (bsc#1138336).
- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).
- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).
- xdp: check device pointer before clearing (bsc#1109837).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen/pciback: Don't disable PCI_COMMAND on PCI device reset (bsc#1065600).
- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).
- xfs: add log item pinning error injection tag (bsc#1114427).
- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).
- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).
- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).
- xfs: buffer lru reference count error injection tag (bsc#1114427).
- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).
- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).
- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).
- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).
- xfs: check _btree_check_block value (bsc#1123663).
- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).
- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).
- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).
- xfs: create block pointer check functions (bsc#1123663).
- xfs: create inode pointer verifiers (bsc#1114427).
- xfs: detect and fix bad summary counts at mount (bsc#1114427).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).
- xfs: don't clear imap_valid for a non-uptodate buffers (bsc#1138018).
- xfs: don't look at buffer heads in xfs_add_to_ioend (bsc#1138013).
- xfs: don't use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).
- xfs: don't use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).
- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).
- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).
- xfs: export various function for the online scrubber (bsc#1123663).
- xfs: expose errortag knobs via sysfs (bsc#1114427).
- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).
- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).
- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).
- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).
- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).
- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).
- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).
- xfs: fix s_maxbytes overflow problems (bsc#1137996).
- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).
- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).
- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).
- xfs: force summary counter recalc at next mount (bsc#1114427).
- xfs: hold xfs_buf locked between shortform leaf conversion and the addition of an attribute (bsc#1133675).
- xfs: kill meaningless variable 'zero' (bsc#1106011).
- xfs: make errortag a per-mountpoint structure (bsc#1123663).
- xfs: make xfs_writepage_map extent map centric (bsc#1138009).
- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).
- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).
- xfs: move error injection tags into their own file (bsc#1114427).
- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).
- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).
- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).
- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).
- xfs: refactor btree block header checking functions (bsc#1123663).
- xfs: refactor btree pointer checks (bsc#1123663).
- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).
- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).
- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).
- xfs: refactor unmount record write (bsc#1114427).
- xfs: refactor xfs_trans_roll (bsc#1133667).
- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).
- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).
- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).
- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).
- xfs: remove XFS_IO_INVALID (bsc#1138017).
- xfs: remove dest file's post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).
- xfs: remove dest file's post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).
- xfs: remove the imap_valid flag (bsc#1138012).
- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).
- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).
- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).
- xfs: remove xfs_map_cow (bsc#1138007).
- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).
- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).
- xfs: remove xfs_start_page_writeback (bsc#1138015).
- xfs: remove xfs_zero_range (bsc#1106011).
- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).
- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).
- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).
- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).
- xfs: sanity-check the unused space before trying to use it (bsc#1123663).
- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).
- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).
- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).
- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).
- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).
- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).
- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).
- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).
- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).
- xhci: Use %zu for printing size_t type (bsc#1051510).
- xhci: update bounce buffer with correct sg num (bsc#1051510).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 FATE#326009).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).
Patchnames
SUSE-2019-2430,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2430,SUSE-SLE-Module-RT-15-SP1-2019-2430
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-source-rt", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130: Microarchitectural Store Buffer Data Sampling (MSBDS): Stored buffers on some microprocessors utilizing speculative execution which may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1103186)\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1111331)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1136586)\n- CVE-2019-10124: An issue was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() runs on a thp tail page after pmd is split, an attacker could cause a denial of service (bsc#1130699).\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions. (bsc#1133188)\n- CVE-2019-11811: An issue was discovered in the Linux kernel There was a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module was removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. (bsc#1134397)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests. (bsc#1133190)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem. (bsc#1135281)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bsc#1120843)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bsc#1135603)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bsc#1134848)\n- CVE-2019-9500: An issue was discovered that lead to brcmfmac heap buffer overflow. (bsc#1132681)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bsc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bsc#1135278)\n- CVE-2018-16880: A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may have lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bsc#1122767)\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-3882: A flaw was found in the Linux kernel\u0027s vfio interface implementation that permitted violation of the user\u0027s locked memory limit. If a device was bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may have caused a system memory exhaustion and thus a denial of service (DoS). (bsc#1131427)\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bsc#1136424)\n- CVE-2019-8564: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132673)\n- CVE-2019-9503: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132828)\n- CVE-2019-9003: In the Linux kernel, attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \u0027service ipmievd restart\u0027 loop. (bsc#1126704)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).\n- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n- CVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. (bnc#1143189)\n- CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \u0027double fetch\u0027 vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used. (bsc#1136922)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. (bsc#1136598)\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling nexthdr (bsc#1051510).\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- 9p: do not trust pdu content for stat item size (bsc#1051510).\n- ARM: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- ARM: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- ARM: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- ARM: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- ARM: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- ARM: iop: don\u0027t use using 64-bit DMA masks (bsc#1051510).\n- ARM: orion: don\u0027t use using 64-bit DMA masks (bsc#1051510).\n- ARM: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- ARM: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- ASoC: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- ASoC: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fix valid stream condition (bsc#1051510).\n- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- ASoC: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- ASoC: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- ASoC: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ASoC: stm32: fix sai driver name initialisation (bsc#1051510).\n- ASoC: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- ASoC: topology: free created components in tplg load error (bsc#1051510).\n- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Backporting hwpoison fixes\n- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- Bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).\n- Bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- CIFS: Do not count -ENODATA as failure for query directory (bsc#1051510).\n- CIFS: Do not hide EINTR after sending network packets (bsc#1051510).\n- CIFS: Do not reconnect TCP session in add_credits() (bsc#1051510).\n- CIFS: Do not reset lease state to NONE on lease break (bsc#1051510).\n- CIFS: Fix adjustment of credits for MTU requests (bsc#1051510).\n- CIFS: Fix credit calculation for encrypted reads with errors (bsc#1051510).\n- CIFS: Fix credits calculations for reads with errors (bsc#1051510).\n- CIFS: Fix possible hang during async MTU reads and writes (bsc#1051510).\n- CIFS: Fix read after write for files with read caching (bsc#1051510).\n- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bsc#1051510).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- Fix cpu online check (bsc#1051510).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: core: move Usage Page concatenation to Main item (bsc#1093389).\n- HID: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- HID: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- HID: input: add mapping for Assistant key (bsc#1051510).\n- HID: input: add mapping for Expose/Overview key (bsc#1051510).\n- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- HID: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).\n- HID: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Don\u0027t report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Don\u0027t set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).\n- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).\n- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992 FATE#326009).\n- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991 FATE#326007).\n- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).\n- Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: introduce KEY_ASSISTANT (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- Input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- KEYS: always initialize keyring_index_key::desc_len (bsc#1051510).\n- KEYS: user: Align the payload buffer (bsc#1051510).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).\n- MD: fix invalid stored role for a disk (bsc#1051510).\n- NFC: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).\n- PCI/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).\n- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- PM / core: Propagate dev power.wakeup_path when no callbacks (bsc#1051510).\n- RAS/CEC: Check the correct variable in the debugfs error handling (bsc#1085535).\n- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- RAS/CEC: Fix binary search function (bsc#1114279).\n- RDMA/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).\n- RDMA/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).\n- RDMA/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).\n- RDMA/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).\n- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992 FATE#326009).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).\n- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992 FATE#326009).\n- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 FATE#326009).\n- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992 FATE#326009).\n- Re-export snd_cards for kABI compatibility (bsc#1051510).\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027 \n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027net: ena: ethtool: add extra properties retrieval via get_priv_flags\u0027 (bsc#1138879).\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027 This broke the build with older gcc instead.\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- SMB3: Fix endian warning (bsc#1137884).\n- UAS: fix alignment of scatter/gather segments (bsc#1129770).\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- USB: cdc-acm: fix unthrottle races (bsc#1051510).\n- USB: core: Don\u0027t unbind interfaces following device reset failure (bsc#1051510).\n- USB: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- USB: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).\n- USB: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- USB: serial: fix unthrottle races (bsc#1051510).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- USB: yurex: Fix protection fault after device removal (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- acpi / SBS: Fix GPE storm on recent MacBookPro\u0027s (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi: PM: Set enable_for_wake for wakeup GPEs during suspend-to-idle (bsc#1111666).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi: property: restore _DSD data subnodes GUID comment (bsc#1111666).\n- acpiCA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpiCA: Clear status of GPEs on first direct enable (bsc#1111666).\n- acpiCA: Namespace: remove address node from global list after method termination (bsc#1051510).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Don\u0027t allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: core: Don\u0027t refer to snd_cards array directly (bsc#1051510).\n- alsa: core: Fix card races between register and disconnect (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).\n- alsa: hda - Don\u0027t resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).\n- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hda/realtek - Move to ACT_INIT state (bsc#1111666).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC256 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC295 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer TravelMate B114-21 with ALC233 (bsc#1111666).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda: Initialize power_state field properly (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: line6: use dynamic buffers (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- arm64: fix acpi dependencies (bsc#1117158).\n- assume flash part size to be 4MB, if it can\u0027t be determined (bsc#1127371).\n- at76c50x-usb: Don\u0027t register led_trigger if usb_register_driver failed (bsc#1051510).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: avoid possible string overflow (bsc#1051510).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: snoc: fix unbalanced clock error handling (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set flush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add comment for cache_set fill_iter (bsc#1130972).\n- bcache: add comment for cache_set fill_iter (bsc#1130972).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(b write_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: destroy dc writeback_write_wq if failed to create dc writeback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: set largest seq to ja seq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).\n- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).\n- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).\n- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).\n- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).\n- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).\n- blkcg: Introduce blkg_root_lookup() (bsc#1131673).\n- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).\n- block: Introduce blk_exit_queue() (bsc#1131673).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).\n- block: remove bio_rewind_iter() (bsc#1131673).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).\n- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnx2x: Remove set but not used variable \u0027mfw_vn\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix spelling mistake \u0027dicline\u0027 \u0027decline\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745 FATE#325918).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745 FATE#325918).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242 FATE#322914).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745 FATE#325918).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n- bpf, devmap: Add missing bulk queue free (bsc#1109837).\n- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf: fix use after free in bpf_evict_inode (bsc#1083647).\n- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n- bpf: sockmap fix msg sg.size account on ingress skb (bsc#1109837).\n- bpf: sockmap remove duplicate queue free (bsc#1109837).\n- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix NULL pointer derefence during USB disconnect (bsc#1111666).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- brcmfmac: fix leak of mypkt on error return path (bsc#1111666).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix ci i_head_snapc leak (bsc#1122776).\n- ceph: fix ci i_head_snapc leak (bsc#1122776).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: Handle WMM rules in regulatory domain intersection (bsc#1111666).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- cgroup: fix parsing empty mount option string (bsc#1133094).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).\n- cifs: Fix potential OOB access of lock element array (bsc#1051510).\n- cifs: don\u0027t dereference smb_file_target before null check (bsc#1051510). \n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Don\u0027t yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).\n- config: arm64: enable CN99xx uncore pmu References: bsc#1117114\n- configfs: Fix use-after-free when accessing sd s_dentry (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178). \n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU doesn\u0027t support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm/aes-neonbs - don\u0027t access already-freed walk.iv (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: caam - add missing put_device() call (bsc#1129770).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: caam/qi2 - fix DMA mapping of stack memory (bsc#1111666).\n- crypto: caam/qi2 - fix zero-length buffer DMA mapping (bsc#1111666).\n- crypto: caam/qi2 - generate hash keys in-place (bsc#1111666).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).\n- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix passing zero to \u0027PTR_ERR\u0027 warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Handle pci shutdown event (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variable \u0027kctx_len\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variables \u0027adap\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove set but not used variables \u0027err, adap, request, hws\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).\n- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).\n- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: skcipher - don\u0027t WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).\n- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).\n- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).\n- cxgb4/cxgb4vf: Fix up netdev hw_features (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Link management changes (bsc#1127371).\n- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).\n- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).\n- cxgb4: Add flag tc_flower_initialized (bsc#1127371).\n- cxgb4: Add new T5 pci device id 0x50ae (bsc#1127371).\n- cxgb4: Add new T5 pci device ids 0x50af and 0x50b0 (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608a (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608b (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).\n- cxgb4: Add support to read actual provisioned resources (bsc#1127371).\n- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).\n- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).\n- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).\n- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).\n- cxgb4: Revert \u0027cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Support ethtool private flags (bsc#1127371).\n- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).\n- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).\n- cxgb4: add support to display DCB info (bsc#1127371).\n- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).\n- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).\n- cxgb4: collect hardware queue descriptors (bsc#1127371).\n- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).\n- cxgb4: convert flower table to use rhashtable (bsc#1127371).\n- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).\n- cxgb4: display number of rx and tx pages free (bsc#1127371).\n- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).\n- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).\n- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).\n- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).\n- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).\n- cxgb4: remove set but not used variables \u0027multitrc, speed\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove the unneeded locks (bsc#1127371).\n- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).\n- cxgb4: update supported DCB version (bsc#1127371).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).\n- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Few more link management changes (bsc#1127374).\n- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).\n- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).\n- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- device_cgroup: fix RCU imbalance in error case (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).\n- dmaengine: axi-dmac: Don\u0027t check the number of frames for alignment (bsc#1051510).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).\n- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).\n- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-adma: restore channel status (bsc#1111666).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).\n- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: thermal: tsens: Don\u0027t print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).\n- drm/amd/display: If one stream full updates, full update all planes (bsc#1111666).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/amd/display: Set stream mode_changed when connectors change (bsc#1111666).\n- drm/amd/display: Use plane color_space for dpp if specified (bsc#1111666).\n- drm/amd/display: extending AUX SW Timeout (bsc#1111666).\n- drm/amd/display: fix cursor black issue (bsc#1111666).\n- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).\n- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/amdgpu/gmc9: fix VM_L2_CNTL3 programming (bsc#1111666).\n- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).\n- drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) (bsc#1111666).\n- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/doc: Drop \u0027content type\u0027 from the legacy kms property table (bsc#1111666).\n- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/exynos/mixer: fix MIXER shadow registry synchronisation code (bsc#1111666).\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/fb-helper: generic: Call drm_client_add() after setup is done (bsc#1111666).\n- drm/fb-helper: generic: Don\u0027t take module ref for fbcon (bsc#1111666).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113956)\n- drm/i915/gvt: Annotate iomem usage (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).\n- drm/i915/gvt: Prevent use-after-free in ppgtt_free_all_spt() (bsc#1111666).\n- drm/i915/gvt: Roundup fb height into tile\u0027s height at calucation fb size (bsc#1111666).\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113956)\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/i915/icl: Whitelist GEN9_SLICE_COMMON_ECO_CHICKEN1 (bsc#1111666).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Disable tv output on i9x5gm (bsc#1086657, bsc#1133897).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/i915: Force 2*96 MHz cdclk on glk/cnl when audio power is enabled (bsc#1111666).\n- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).\n- drm/imx: don\u0027t skip DP channel disable for background plane (bsc#1051510).\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n- drm/lease: Make sure implicit planes are leased (bsc#1111666).\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113956)\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/meson: Add support for XBGR8888 ABGR8888 formats (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).\n- drm/msm: fix fb references in async update (bsc#1111666).\n- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/tu104: initial support (bsc#1133593).\n- drm/nouveau/bar/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios/tu104: initial support (bsc#1133593).\n- drm/nouveau/bios/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios: translate additional memory types (bsc#1133593).\n- drm/nouveau/bios: translate usb-C connector type (bsc#1133593).\n- drm/nouveau/bus/tu104: initial support (bsc#1133593).\n- drm/nouveau/bus/tu106: initial support (bsc#1133593).\n- drm/nouveau/ce/tu104: initial support (bsc#1133593).\n- drm/nouveau/ce/tu106: initial support (bsc#1133593).\n- drm/nouveau/core: increase maximum number of nvdec instances to 3 (bsc#1133593).\n- drm/nouveau/core: recognise TU102 (bsc#1133593).\n- drm/nouveau/core: recognise TU104 (bsc#1133593).\n- drm/nouveau/core: recognise TU106 (bsc#1133593).\n- drm/nouveau/core: support multiple nvdec instances (bsc#1133593).\n- drm/nouveau/devinit/gm200-: export function to upload+execute PMU/PRE_OS (bsc#1133593).\n- drm/nouveau/devinit/tu104: initial support (bsc#1133593).\n- drm/nouveau/devinit/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/disp/gm200-: add scdc parameter setter (bsc#1133593).\n- drm/nouveau/disp/gv100: fix name of window channels in debug output (bsc#1133593).\n- drm/nouveau/disp/tu104: initial support (bsc#1133593).\n- drm/nouveau/disp/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp: add a way to configure scrambling/tmds for hdmi 2.0 (bsc#1133593).\n- drm/nouveau/disp: add support for setting scdc parameters for high modes (bsc#1133593).\n- drm/nouveau/disp: keep track of high-speed state, program into clock (bsc#1133593).\n- drm/nouveau/disp: take sink support into account for exposing 594mhz (bsc#1133593).\n- drm/nouveau/dma/tu104: initial support (bsc#1133593).\n- drm/nouveau/dma/tu106: initial support (bsc#1133593).\n- drm/nouveau/drm/nouveau: Do not forget to label dp_aux devices (bsc#1133593).\n- drm/nouveau/drm/nouveau: s/nouveau_backlight_exit/nouveau_backlight_fini/ (bsc#1133593).\n- drm/nouveau/drm/nouveau: tegra: Call nouveau_drm_device_init() (bsc#1133593).\n- drm/nouveau/fault/tu104: initial support (bsc#1133593).\n- drm/nouveau/fault/tu106: initial support (bsc#1133593).\n- drm/nouveau/fault: add explicit control over fault buffer interrupts (bsc#1133593).\n- drm/nouveau/fault: remove manual mapping of fault buffers into BAR2 (bsc#1133593).\n- drm/nouveau/fault: store get/put pri address in nvkm_fault_buffer (bsc#1133593).\n- drm/nouveau/fb/tu104: initial support (bsc#1133593).\n- drm/nouveau/fb/tu106: initial support (bsc#1133593).\n- drm/nouveau/fifo/gf100-: call into BAR to reset BARs after MMU fault (bsc#1133593).\n- drm/nouveau/fifo/gk104-: group pbdma functions together (bsc#1133593).\n- drm/nouveau/fifo/gk104-: return channel instance in ctor args (bsc#1133593).\n- drm/nouveau/fifo/gk104-: separate runlist building from committing to hw (bsc#1133593).\n- drm/nouveau/fifo/gk104-: support enabling privileged ce functions (bsc#1133593).\n- drm/nouveau/fifo/gk104-: virtualise pbdma enable function (bsc#1133593).\n- drm/nouveau/fifo/gm200-: read pbdma count more directly (bsc#1133593).\n- drm/nouveau/fifo/gv100: allocate method buffer (bsc#1133593).\n- drm/nouveau/fifo/gv100: return work submission token in channel ctor args (bsc#1133593).\n- drm/nouveau/fifo/tu104: initial support (bsc#1133593).\n- drm/nouveau/fifo/tu106: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu104: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu106: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu104: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu104: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c: Disable i2c bus access after fini() (bsc#1113722)\n- drm/nouveau/i2c: Enable i2c pads busses during preinit (bsc#1051510).\n- drm/nouveau/ibus/tu104: initial support (bsc#1133593).\n- drm/nouveau/ibus/tu106: initial support (bsc#1133593).\n- drm/nouveau/imem/nv50: support pinning objects in BAR2 and returning address (bsc#1133593).\n- drm/nouveau/imem/tu104: initial support (bsc#1133593).\n- drm/nouveau/imem/tu106: initial support (bsc#1133593).\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- drm/nouveau/kms/nv50-: allow more flexibility with lut formats (bsc#1133593).\n- drm/nouveau/kms/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mc/tu104: initial support (bsc#1133593).\n- drm/nouveau/mc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu: add more general vmm free/node handling functions (bsc#1133593).\n- drm/nouveau/pci/tu104: initial support (bsc#1133593).\n- drm/nouveau/pci/tu106: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/therm/tu104: initial support (bsc#1133593).\n- drm/nouveau/therm/tu106: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu104: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu106: initial support (bsc#1133593).\n- drm/nouveau/top/tu104: initial support (bsc#1133593).\n- drm/nouveau/top/tu106: initial support (bsc#1133593).\n- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).\n- drm/nouveau: Add NV_PRINTK_ONCE and variants (bsc#1133593).\n- drm/nouveau: Add size to vbios.rom file in debugfs (bsc#1133593).\n- drm/nouveau: Add strap_peek to debugfs (bsc#1133593).\n- drm/nouveau: Cleanup indenting in nouveau_backlight.c (bsc#1133593).\n- drm/nouveau: Fix potential memory leak in nouveau_drm_load() (bsc#1133593).\n- drm/nouveau: Move backlight device into nouveau_connector (bsc#1133593).\n- drm/nouveau: Refactor nvXX_backlight_init() (bsc#1133593).\n- drm/nouveau: Remove unecessary dma_fence_ops (bsc#1133593).\n- drm/nouveau: Start using new drm_dev initialization helpers (bsc#1133593).\n- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).\n- drm/nouveau: add DisplayPort CEC-Tunneling-over-AUX support (bsc#1133593).\n- drm/nouveau: register backlight on pascal and newer (bsc#1133593).\n- drm/nouveau: remove left-over struct member (bsc#1133593).\n- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).\n- drm/omap: hdmi4_cec: Fix CEC clock handling for PM (bsc#1111666).\n- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).\n- drm/panel: panel-innolux: set display off in innolux_panel_unprepare (bsc#1111666).\n- drm/pl111: Initialize clock spinlock early (bsc#1111666).\n- drm/pl111: fix possible object reference leak (bsc#1111666).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1111666).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)\n- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)\n- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)\n- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).\n- drm/sun4i: Fix sun8i HDMI PHY configuration for 148.5 MHz (bsc#1111666).\n- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)\n- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)\n- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).\n- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in sun8i_tcon_top_un/bind (bsc#1111666).\n- drm/tegra: gem: Fix CPU-cache maintenance for BO\u0027s allocated using get_pages() (bsc#1111666).\n- drm/tegra: hub: Fix dereference before check (bsc#1111666).\n- drm/ttm: Fix bo_global and mem_global kfree error (bsc#1111666).\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/udl: add a release method and delay modeset teardown (bsc#1085536)\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/v3d: Handle errors from IRQ setup (bsc#1111666).\n- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Don\u0027t send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: Remove set but not used variable \u0027restart\u0027 (bsc#1111666).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).\n- drm: Fix drm_release() and device unplug (bsc#1111666).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).\n- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)\n- drm: don\u0027t block fb changes for async plane updates (bsc#1111666).\n- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n- drm: rcar-du: Fix rcar_du_crtc structure documentation (bsc#1111666).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm_dp_cec: add note about good MegaChips 2900 CEC support (bsc#1136978).\n- drm_dp_cec: check that aux has a transfer function (bsc#1136978).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).\n- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- ext4: Do not warn when enabling DAX (bsc#1132894).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix cgroup_do_mount() handling of failure exits (bsc#1133095).\n- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712) \n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- futex: Cure exit race (bsc#1050549).\n- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).\n- futex: Handle early deadlock return correctly (bsc#1050549).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).\n- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid: i2c-hid: Ignore input report if there\u0027s no data present on Elan touchpanels (bsc#1133486).\n- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hwmon: (core) add thermal sensors only if dev of_node is present (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: imx: correct the method of getting private data in notifier_call (bsc#1111666).\n- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n- i2c: synquacer: fix enumeration of slave devices (bsc#1111666).\n- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).\n- ib/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Enable GRO (bsc#1132227).\n- ibmvnic: Fix completion structure initialization (bsc#1131659).\n- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).\n- iio: Fix scan mask selection (bsc#1051510).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).\n- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).\n- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: core: fix a possible circular locking dependency (bsc#1051510).\n- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).\n- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).\n- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/amd: Set exclusion range correctly (bsc#1130425).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).\n- ipmi: Prevent use-after-free in deliver_response (bsc#1111666).\n- ipmi: fix sleep-in-atomic in free_user at cleanup SRCU user release_barrier (bsc#1111666).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- ipvlan: Add the skb mark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Don\u0027t clear eventid when freeing an MSI (bsc#1051510).\n- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).\n- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).\n- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: don\u0027t WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: fix driver operation for 5350 (bsc#1111666).\n- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: don\u0027t crash on invalid RX interrupt (bsc#1051510).\n- iwlwifi: pcie: don\u0027t service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kABI workaround for asus-wmi changes (bsc#1051510).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kABI: protect functions using struct net_generic (bsc#1129845 LTC#176252).\n- kABI: protect struct smc_ib_device (bsc#1129845 LTC#176252).\n- kABI: protect struct smcd_dev (bsc#1129845 LTC#176252).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).\n- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).\n- kabi/severities: exclude hns3 symbols (bsc#1134948)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).\n- kcm: switch order of device registration to fix a crash (bnc#1130527).\n- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).\n- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernfs: do not set dentry d_fsdata (boo#1133115).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).\n- kvm: VMX: Compare only a single byte for VMCS\u0027 \u0027launched\u0027 in vCPU-run (bsc#1132555).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).\n- kvm: nVMX: Sign extend displacements of VMX instr\u0027s mem operands (bsc#1132562).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).\n- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- kvm: x86: Report STibP on GET_SUPPORTED_CPUID (bsc#1111331).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg offset is greater than PAGE_SIZE (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lightnvm: if LUNs are already allocated fix return (bsc#1085535). \n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode (bsc#1111666).\n- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: don\u0027t attempt to rename ERR_PTR() debugfs dirs (bsc#1111666).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: batch flush requests (bsc#1119680).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).\n- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format doesn\u0027t match (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg type in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev bitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).\n- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm/debug.c: fix __dump_page when mapping host is not set (bsc#1131934).\n- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).\n- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: fix race on soft-offlining free huge pages (bsc#1139712). \n- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712). \n- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712).\n- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712) \n- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712). \n- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712). \n- mm: hwpoison: introduce idenfity_page_state (bsc#1139712). \n- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712). \n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm: soft-offline: close the race against page allocation (bsc#1139712). \n- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712). \n- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712). \n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: bcm2835 MMC issues (bsc#1070872).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: Fix tag set memory leak (bsc#1111666).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: core: complete HS400 before checking status (bsc#1111666).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: davinci: remove extraneous __init annotation (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).\n- mmc: sdhci: Handle auto-command errors (bsc#1051510).\n- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).\n- mmc: tmio_mmc_core: don\u0027t claim spurious interrupts (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mt7601u: bump supported EEPROM version (bsc#1051510).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd name (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Make resume actually do something useful again on SDIO cards (bsc#1111666).\n- mwifiex: don\u0027t advertise IBSS features without FW support (bsc#1129770). \n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).\n- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).\n- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).\n- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).\n- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n- net/sched: don\u0027t dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: don\u0027t dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/smc: add pnet table namespace support (bsc#1129845 LTC#176252).\n- net/smc: add smcd support to the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pnetid-less configuration (bsc#1129845 LTC#176252).\n- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).\n- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1129845 LTC#176252).\n- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).\n- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).\n- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).\n- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).\n- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).\n- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).\n- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).\n- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).\n- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).\n- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).\n- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).\n- net/smc: return booleans instead of integers (bsc#1096003, FATE#325023, LTC#164003).\n- net/smc: rework pnet table (bsc#1129845 LTC#176252).\n- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).\n- net/tls: avoid NULL pointer deref on nskb sk in fallback (bsc#1109837).\n- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n- net/tls: don\u0027t copy negative amounts of data in reencrypt (bsc#1109837).\n- net/tls: don\u0027t ignore netdev notifications if no TLS features (bsc#1109837).\n- net/tls: don\u0027t leak IV and record seq when offload fails (bsc#1109837).\n- net/tls: don\u0027t leak partially sent record in device mode (bsc#1109837).\n- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n- net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n- net/tls: fix page double free on TX cleanup (bsc#1109837).\n- net/tls: fix refcount adjustment in fallback (bsc#1109837).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: fix state removal with feature flags off (bsc#1109837).\n- net/tls: fix the IV leaks (bsc#1109837).\n- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n- net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).\n- net: core: support XDP generic on stacked devices (bsc#1109837).\n- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).\n- net: don\u0027t clear sock sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n- net: ena: add good checksum counter (bsc#1138879).\n- net: ena: add handling of llq max tx burst size (bsc#1138879).\n- net: ena: add newline at the end of pr_err prints (bsc#1138879).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n- net: ena: allow automatic fallback to polling mode (bsc#1138879).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n- net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n- net: ena: fix incorrect test of supported hash function (bsc#1138879).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n- net: ena: gcc 8: fix compilation warning (bsc#1138879).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n- net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n- net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n- net: ena: use dev_info_once instead of static variable (bsc#1138879).\n- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).\n- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).\n- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).\n- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).\n- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).\n- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).\n- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: add queue\u0027s statistics update to service task (bsc#1104353 bsc#1134981).\n- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).\n- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).\n- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).\n- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).\n- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).\n- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).\n- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).\n- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).\n- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).\n- net: hns3: code optimization for command queue\u0027 spin lock (bsc#1104353 bsc#1135042).\n- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).\n- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).\n- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).\n- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).\n- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).\n- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).\n- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).\n- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).\n- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).\n- net: hns3: fix for vport bw_limit overflow problem (bsc#1104353 bsc#1134998).\n- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).\n- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).\n- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).\n- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).\n- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).\n- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).\n- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).\n- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).\n- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).\n- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).\n- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).\n- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).\n- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).\n- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).\n- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).\n- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).\n- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).\n- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).\n- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).\n- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).\n- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).\n- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).\n- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).\n- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).\n- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).\n- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).\n- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).\n- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).\n- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).\n- net: hns3: use atomic_t replace u32 for arq\u0027s count (bsc#1104353 bsc#1134953).\n- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).\n- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).\n- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).\n- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).\n- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).\n- net: smc_close: mark expected switch fall-through (bsc#1096003, FATE#325023, LTC#164003).\n- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n- nfs: Fix dentry revalidation on nfsv4 lookup (bsc#1132618).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- nvme-fc: use separate work queue to avoid warning (bsc#1131673).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1130937).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: add proper discard setup for the multipath device (bsc#1114638).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: fix the dangerous reference of namespaces list (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvme: make sure ns head inherits underlying device limits (bsc#1131673).\n- nvme: only reconfigure discard if necessary (bsc#1114638).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Don\u0027t let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- overflow: Fix -Wtype-limits compilation warnings (bsc#1111666).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- pci/aer: Use cached AER Capability offset (bsc#1142623).\n- pci/p2pdma: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Init PCIe feature bits for managed host bridge alloc (bsc#1111666).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: pciehp: Convert to threaded IRQ (bsc#1133005).\n- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).\n- pci: pciehp: Tolerate Presence Detect hardwired to zero (bsc#1133016).\n- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- perf/x86/amd: Add event map for AMD Family 17h (bsc#1134223).\n- perf/x86/amd: Update generic hardware cache events for Family 17h (bsc#1134223).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- phy: sun4i-usb: Support set_mode to USB_HOST for non-OTG PHYs (bsc#1051510).\n- pinctrl/amd: add get_direction handler (bsc#1140463).\n- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- pm: acpi/PCI: Resume all devices during hibernation (bsc#1111666).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).\n- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, fate#323286, git-fixes).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, fate#323286, git-fixes).\n- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Check secondary hash page table (bsc#1065729).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, fate#323286, git-fixes).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).\n- powerpc/numa: improve control of topology updates (bsc#1133584).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).\n- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).\n- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).\n- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).\n- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).\n- powerpc/powernv: Don\u0027t reprogram SLW image on every KVM guest entry/exit (bsc#1061840).\n- powerpc/powernv: Make opal log only readable by root (bsc#1065729).\n- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: Fix 32-bit KVM-PR lockup and host crash with MacOS guest (bsc#1061840).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).\n- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- proc/kcore: don\u0027t bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Don\u0027t disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: stm32: Use 3 cells of_xlate() (bsc#1111666).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128971).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).\n- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027cur_rings, max_hw_rings, tx_desc_info\u0027 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027op, cmd_op\u0027 (bsc#1136469 jsc#SLE-4695).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rdma/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).\n- rdma/cxgb4: Add support for kernel mode SRQ\u0027s (bsc#1127371).\n- rdma/cxgb4: Add support for srq functions and structs (bsc#1127371).\n- rdma/cxgb4: Don\u0027t expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix spelling mistake \u0027immedate\u0027 \u0027immediate\u0027 (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).\n- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).\n- rdma/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: fix some info leaks (bsc#1127371).\n- rdma/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).\n- rdma/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).\n- rdma/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).\n- rdma/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).\n- rdma/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).\n- rdma/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the chip hanging caused by sending mailbox CMQ during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).\n- rdma/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).\n- rdma/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).\n- rdma/hns: Make some function static (bsc#1104427 bsc#1126206).\n- rdma/hns: Modify qp specification according to UM (bsc#1104427 bsc#1137233).\n- rdma/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).\n- rdma/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove set but not used variable \u0027rst\u0027 (bsc#1104427 bsc#1126206).\n- rdma/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).\n- rdma/hns: Update CQE specifications (bsc#1104427 bsc#1137236).\n- rdma/hns: rdma/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).\n- rdma/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).\n- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).\n- rdma/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).\n- rdma/qedr: Fix incorrect device rate (bsc#1136188).\n- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).\n- rdma/smc: Replace ib_query_gid with rdma_get_gid_attr (bsc#1131530 LTC#176717).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- ring-buffer: Check if memory is available before allocation (bsc#1132531).\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: don\u0027t reference bogus function pointer in kdoc (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtlwifi: fix potential NULL pointer dereference (bsc#1111666).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/dasd: fix panic for failed online processing (bsc#1132589).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178). \n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: fix spelling mistake \u0027Retreiving\u0027 \u0027Retrieving\u0027 (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: csiostor: Remove set but not used variable \u0027pln\u0027 (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst atid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi: hisi: KABI ignore new symbols (bsc#1135038).\n- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).\n- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).\n- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).\n- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).\n- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).\n- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).\n- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).\n- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).\n- scsi: hisi_sas: add host reset interface for test (bsc#1135041).\n- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).\n- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).\n- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).\n- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).\n- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).\n- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).\n- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).\n- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).\n- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add additional checks for io_req sc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).\n- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).\n- scsi: qla2xxx: Avoid pci IRQ affinity mapping when multiqueue is not supported (bsc#1136215).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).\n- scsi: qla2xxx: Remove FW default template (bsc#1136215).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: avoid printf format warning (bsc#1136215).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 - \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- scsi: smartpqi: Add retries for device reset (bsc#1133547).\n- scsi: smartpqi: Reporting \u0027logical unit failure\u0027 (bsc#1133547).\n- scsi: smartpqi: add H3C controller IDs (bsc#1133547).\n- scsi: smartpqi: add h3c ssid (bsc#1133547).\n- scsi: smartpqi: add no_write_same for logical volumes (bsc#1133547).\n- scsi: smartpqi: add ofa support (bsc#1133547).\n- scsi: smartpqi: add smp_utils support (bsc#1133547).\n- scsi: smartpqi: add spdx (bsc#1133547).\n- scsi: smartpqi: add support for PQI Config Table handshake (bsc#1133547).\n- scsi: smartpqi: add support for huawei controllers (bsc#1133547).\n- scsi: smartpqi: add sysfs attributes (bsc#1133547).\n- scsi: smartpqi: allow for larger raid maps (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: call pqi_free_interrupts() in pqi_shutdown() (bsc#1133547).\n- scsi: smartpqi: check for null device pointers (bsc#1133547).\n- scsi: smartpqi: correct host serial num for ssa (bsc#1133547).\n- scsi: smartpqi: correct lun reset issues (bsc#1133547).\n- scsi: smartpqi: correct volume status (bsc#1133547).\n- scsi: smartpqi: do not offline disks for transient did no connect conditions (bsc#1133547).\n- scsi: smartpqi: enhance numa node detection (bsc#1133547).\n- scsi: smartpqi: fix build warnings (bsc#1133547).\n- scsi: smartpqi: fix disk name mount point (bsc#1133547).\n- scsi: smartpqi: fully convert to the generic DMA API (bsc#1133547).\n- scsi: smartpqi: increase LUN reset timeout (bsc#1133547).\n- scsi: smartpqi: increase fw status register read timeout (bsc#1133547).\n- scsi: smartpqi: refactor sending controller raid requests (bsc#1133547).\n- scsi: smartpqi: turn off lun data caching for ptraid (bsc#1133547).\n- scsi: smartpqi: update copyright (bsc#1133547).\n- scsi: smartpqi: update driver version (bsc#1133547).\n- scsi: smartpqi: wake up drives after os resumes from suspend (bsc#1133547).\n- scsi: smartpqi_init: fix boolean expression in pqi_device_remove_start (bsc#1133547).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi-mem: fix kernel-doc for spi_mem_dirmap_{read|write}() (bsc#1111666).\n- spi: Add missing pm_runtime_put_noidle() after failed get (bsc#1111666).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix possible double-free of usb_rx_buf (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).\n- staging: comedi: vmk80xx: Fix possible double-free of usb_rx_buf (bsc#1051510).\n- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).\n- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).\n- staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc (bsc#1111666).\n- staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference (bsc#1111666).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510). \n- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- supported.conf: Add cls_bpf, sch_ingress to kernel-default-base (bsc#1134743).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).\n- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC DFR and LDR handling (bsc#1132558).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow for file-max (bsc#1051510).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- team: Always enable vlan tx offload (bsc#1051510).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- testing: nvdimm: provide SZ_4G constant (bsc#1132982).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: fix infinite loop in map create (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).\n- tracing: Fix buffer_ref pipe ops (bsc#1133698).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty: serial_core, add install (bnc#1129693).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bsc#1051510).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300 ep[i] (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix return code of wmi_mgmt_tx and wmi_mgmt_tx_ext (bsc#1111666).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/CPU/AMD: Don\u0027t force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and pciE SMCA bank types (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).\n- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).\n- x86/PCI: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318). \n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).\n- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).\n- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/mce: Handle varying MCA bank counts (bsc#1128415).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/perf/amd: Remove need to check \u0027running\u0027 bit in NMI handler (bsc#1131438).\n- x86/perf/amd: Resolve NMI latency issues for active PMCs (bsc#1131438).\n- x86/perf/amd: Resolve race condition when disabling PMC (bsc#1131438).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xdp: check device pointer before clearing (bsc#1109837).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen/pciback: Don\u0027t disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: don\u0027t clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: don\u0027t look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: don\u0027t use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: don\u0027t use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: hold xfs_buf locked between shortform leaf conversion and the addition of an attribute (bsc#1133675).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: refactor xfs_trans_roll (bsc#1133667).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 FATE#326009).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2430,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2430,SUSE-SLE-Module-RT-15-SP1-2019-2430", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2430-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2430-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2430-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1052904", "url": "https://bugzilla.suse.com/1052904" }, { "category": "self", "summary": "SUSE Bug 1053043", "url": "https://bugzilla.suse.com/1053043" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1070872", "url": "https://bugzilla.suse.com/1070872" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1075020", "url": "https://bugzilla.suse.com/1075020" }, { "category": "self", "summary": "SUSE Bug 1082387", "url": "https://bugzilla.suse.com/1082387" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1085535", "url": "https://bugzilla.suse.com/1085535" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1088047", "url": "https://bugzilla.suse.com/1088047" }, { "category": "self", "summary": "SUSE Bug 1088804", "url": "https://bugzilla.suse.com/1088804" }, { "category": "self", "summary": "SUSE Bug 1093389", "url": "https://bugzilla.suse.com/1093389" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1096003", "url": "https://bugzilla.suse.com/1096003" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1099658", "url": "https://bugzilla.suse.com/1099658" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1103186", "url": "https://bugzilla.suse.com/1103186" }, { "category": "self", "summary": "SUSE Bug 1103259", "url": "https://bugzilla.suse.com/1103259" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1106011", "url": "https://bugzilla.suse.com/1106011" }, { "category": "self", "summary": "SUSE Bug 1106284", "url": "https://bugzilla.suse.com/1106284" }, { "category": "self", "summary": "SUSE Bug 1106383", "url": "https://bugzilla.suse.com/1106383" }, { "category": "self", "summary": "SUSE Bug 1106751", "url": "https://bugzilla.suse.com/1106751" }, { "category": "self", "summary": "SUSE Bug 1108193", "url": "https://bugzilla.suse.com/1108193" }, { "category": "self", "summary": "SUSE Bug 1108838", "url": "https://bugzilla.suse.com/1108838" }, { "category": "self", "summary": "SUSE Bug 1108937", "url": "https://bugzilla.suse.com/1108937" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1110946", "url": "https://bugzilla.suse.com/1110946" }, { "category": "self", "summary": "SUSE Bug 1111331", "url": "https://bugzilla.suse.com/1111331" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1111696", "url": "https://bugzilla.suse.com/1111696" }, { "category": "self", "summary": "SUSE Bug 1112063", "url": "https://bugzilla.suse.com/1112063" }, { "category": "self", "summary": "SUSE Bug 1112128", "url": "https://bugzilla.suse.com/1112128" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114427", "url": "https://bugzilla.suse.com/1114427" }, { "category": "self", "summary": "SUSE Bug 1114542", "url": "https://bugzilla.suse.com/1114542" }, { "category": "self", "summary": "SUSE Bug 1114638", "url": "https://bugzilla.suse.com/1114638" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1115688", "url": "https://bugzilla.suse.com/1115688" }, { "category": "self", "summary": "SUSE Bug 1117114", "url": "https://bugzilla.suse.com/1117114" }, { "category": "self", "summary": "SUSE Bug 1117158", "url": "https://bugzilla.suse.com/1117158" }, { "category": "self", "summary": "SUSE Bug 1117561", "url": "https://bugzilla.suse.com/1117561" }, { "category": "self", "summary": "SUSE Bug 1118139", "url": "https://bugzilla.suse.com/1118139" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1119532", "url": "https://bugzilla.suse.com/1119532" }, { "category": "self", "summary": "SUSE Bug 1119680", "url": "https://bugzilla.suse.com/1119680" }, { "category": "self", "summary": "SUSE Bug 1120091", "url": "https://bugzilla.suse.com/1120091" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120423", "url": "https://bugzilla.suse.com/1120423" }, { "category": "self", "summary": "SUSE Bug 1120566", "url": "https://bugzilla.suse.com/1120566" }, { "category": "self", "summary": "SUSE Bug 1120843", "url": "https://bugzilla.suse.com/1120843" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1122767", "url": "https://bugzilla.suse.com/1122767" }, { "category": "self", "summary": "SUSE Bug 1122776", "url": "https://bugzilla.suse.com/1122776" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1123454", "url": "https://bugzilla.suse.com/1123454" }, { "category": "self", "summary": "SUSE Bug 1123663", "url": "https://bugzilla.suse.com/1123663" }, { "category": "self", "summary": "SUSE Bug 1124503", "url": "https://bugzilla.suse.com/1124503" }, { "category": "self", "summary": "SUSE Bug 1124839", "url": "https://bugzilla.suse.com/1124839" }, { "category": "self", "summary": "SUSE Bug 1125703", "url": "https://bugzilla.suse.com/1125703" }, { "category": "self", "summary": "SUSE Bug 1126206", "url": "https://bugzilla.suse.com/1126206" }, { "category": "self", "summary": "SUSE Bug 1126356", "url": "https://bugzilla.suse.com/1126356" }, { "category": "self", "summary": "SUSE Bug 1126704", "url": "https://bugzilla.suse.com/1126704" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127175", "url": "https://bugzilla.suse.com/1127175" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1127374", "url": "https://bugzilla.suse.com/1127374" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1127616", "url": "https://bugzilla.suse.com/1127616" }, { "category": "self", "summary": "SUSE Bug 1128052", "url": "https://bugzilla.suse.com/1128052" }, { "category": "self", "summary": "SUSE Bug 1128415", "url": "https://bugzilla.suse.com/1128415" }, { "category": "self", "summary": "SUSE Bug 1128432", "url": "https://bugzilla.suse.com/1128432" }, { "category": "self", "summary": "SUSE Bug 1128544", "url": "https://bugzilla.suse.com/1128544" }, { "category": "self", "summary": "SUSE Bug 1128902", "url": "https://bugzilla.suse.com/1128902" }, { "category": "self", "summary": "SUSE Bug 1128904", "url": "https://bugzilla.suse.com/1128904" }, { "category": "self", "summary": "SUSE Bug 1128971", "url": "https://bugzilla.suse.com/1128971" }, { "category": "self", "summary": "SUSE Bug 1128979", "url": "https://bugzilla.suse.com/1128979" }, { "category": "self", "summary": "SUSE Bug 1129138", "url": "https://bugzilla.suse.com/1129138" }, { "category": "self", "summary": "SUSE Bug 1129273", "url": "https://bugzilla.suse.com/1129273" }, { "category": "self", "summary": "SUSE Bug 1129693", "url": "https://bugzilla.suse.com/1129693" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129845", "url": "https://bugzilla.suse.com/1129845" }, { "category": "self", "summary": "SUSE Bug 1130195", "url": "https://bugzilla.suse.com/1130195" }, { "category": "self", "summary": "SUSE Bug 1130425", "url": "https://bugzilla.suse.com/1130425" }, { "category": "self", "summary": "SUSE Bug 1130527", "url": "https://bugzilla.suse.com/1130527" }, { "category": "self", "summary": "SUSE Bug 1130567", "url": "https://bugzilla.suse.com/1130567" }, { "category": "self", "summary": "SUSE Bug 1130579", "url": "https://bugzilla.suse.com/1130579" }, { "category": "self", "summary": "SUSE Bug 1130699", "url": "https://bugzilla.suse.com/1130699" }, { "category": "self", "summary": "SUSE Bug 1130836", "url": "https://bugzilla.suse.com/1130836" }, { "category": "self", "summary": "SUSE Bug 1130937", "url": "https://bugzilla.suse.com/1130937" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1131326", "url": "https://bugzilla.suse.com/1131326" }, { "category": "self", "summary": "SUSE Bug 1131427", "url": "https://bugzilla.suse.com/1131427" }, { "category": "self", "summary": "SUSE Bug 1131438", "url": "https://bugzilla.suse.com/1131438" }, { "category": "self", "summary": "SUSE Bug 1131451", "url": "https://bugzilla.suse.com/1131451" }, { "category": "self", "summary": "SUSE Bug 1131467", "url": "https://bugzilla.suse.com/1131467" }, { "category": "self", "summary": "SUSE Bug 1131488", "url": "https://bugzilla.suse.com/1131488" }, { "category": "self", "summary": "SUSE Bug 1131530", "url": "https://bugzilla.suse.com/1131530" }, { "category": "self", "summary": "SUSE Bug 1131565", "url": "https://bugzilla.suse.com/1131565" }, { "category": "self", "summary": "SUSE Bug 1131574", "url": "https://bugzilla.suse.com/1131574" }, { "category": "self", "summary": "SUSE Bug 1131587", "url": "https://bugzilla.suse.com/1131587" }, { "category": "self", "summary": "SUSE Bug 1131645", "url": "https://bugzilla.suse.com/1131645" }, { "category": "self", "summary": "SUSE Bug 1131659", "url": "https://bugzilla.suse.com/1131659" }, { "category": "self", "summary": "SUSE Bug 1131673", "url": "https://bugzilla.suse.com/1131673" }, { "category": "self", "summary": "SUSE Bug 1131847", "url": "https://bugzilla.suse.com/1131847" }, { "category": "self", "summary": "SUSE Bug 1131848", "url": "https://bugzilla.suse.com/1131848" }, { "category": "self", "summary": "SUSE Bug 1131851", "url": "https://bugzilla.suse.com/1131851" }, { "category": "self", "summary": "SUSE Bug 1131900", "url": "https://bugzilla.suse.com/1131900" }, { "category": "self", "summary": "SUSE Bug 1131934", "url": "https://bugzilla.suse.com/1131934" }, { "category": "self", "summary": "SUSE Bug 1131935", "url": "https://bugzilla.suse.com/1131935" }, { "category": "self", "summary": "SUSE Bug 1132044", "url": "https://bugzilla.suse.com/1132044" }, { "category": "self", "summary": "SUSE Bug 1132219", "url": "https://bugzilla.suse.com/1132219" }, { "category": "self", "summary": "SUSE Bug 1132226", "url": "https://bugzilla.suse.com/1132226" }, { "category": "self", "summary": "SUSE Bug 1132227", "url": "https://bugzilla.suse.com/1132227" }, { "category": "self", "summary": "SUSE Bug 1132365", "url": "https://bugzilla.suse.com/1132365" }, { "category": "self", "summary": "SUSE Bug 1132368", "url": "https://bugzilla.suse.com/1132368" }, { "category": "self", "summary": "SUSE Bug 1132369", "url": "https://bugzilla.suse.com/1132369" }, { "category": "self", "summary": "SUSE Bug 1132370", "url": "https://bugzilla.suse.com/1132370" }, { "category": "self", "summary": "SUSE Bug 1132372", "url": "https://bugzilla.suse.com/1132372" }, { "category": "self", "summary": "SUSE Bug 1132373", "url": "https://bugzilla.suse.com/1132373" }, { "category": "self", "summary": "SUSE Bug 1132384", "url": "https://bugzilla.suse.com/1132384" }, { "category": "self", "summary": "SUSE Bug 1132390", "url": "https://bugzilla.suse.com/1132390" }, { "category": "self", "summary": "SUSE Bug 1132397", "url": "https://bugzilla.suse.com/1132397" }, { "category": "self", "summary": "SUSE Bug 1132402", "url": "https://bugzilla.suse.com/1132402" }, { "category": "self", "summary": "SUSE Bug 1132403", "url": "https://bugzilla.suse.com/1132403" }, { "category": "self", "summary": "SUSE Bug 1132404", "url": "https://bugzilla.suse.com/1132404" }, { "category": "self", "summary": "SUSE Bug 1132405", "url": "https://bugzilla.suse.com/1132405" }, { "category": "self", "summary": "SUSE Bug 1132407", "url": "https://bugzilla.suse.com/1132407" }, { "category": "self", "summary": "SUSE Bug 1132411", "url": "https://bugzilla.suse.com/1132411" }, { "category": "self", "summary": "SUSE Bug 1132412", "url": "https://bugzilla.suse.com/1132412" }, { "category": "self", "summary": "SUSE Bug 1132413", "url": "https://bugzilla.suse.com/1132413" }, { "category": "self", "summary": "SUSE Bug 1132414", "url": "https://bugzilla.suse.com/1132414" }, { "category": "self", "summary": "SUSE Bug 1132426", "url": "https://bugzilla.suse.com/1132426" }, { "category": "self", "summary": "SUSE Bug 1132527", "url": "https://bugzilla.suse.com/1132527" }, { "category": "self", "summary": "SUSE Bug 1132531", "url": "https://bugzilla.suse.com/1132531" }, { "category": "self", "summary": "SUSE Bug 1132555", "url": "https://bugzilla.suse.com/1132555" }, { "category": "self", "summary": "SUSE Bug 1132558", "url": "https://bugzilla.suse.com/1132558" }, { "category": "self", "summary": "SUSE Bug 1132561", "url": "https://bugzilla.suse.com/1132561" }, { "category": "self", "summary": "SUSE Bug 1132562", "url": "https://bugzilla.suse.com/1132562" }, { "category": "self", "summary": "SUSE Bug 1132563", "url": "https://bugzilla.suse.com/1132563" }, { "category": "self", "summary": "SUSE Bug 1132564", "url": "https://bugzilla.suse.com/1132564" }, { "category": "self", "summary": "SUSE Bug 1132570", "url": "https://bugzilla.suse.com/1132570" }, { "category": "self", "summary": "SUSE Bug 1132571", "url": "https://bugzilla.suse.com/1132571" }, { "category": "self", "summary": "SUSE Bug 1132572", "url": "https://bugzilla.suse.com/1132572" }, { "category": "self", "summary": "SUSE Bug 1132589", "url": "https://bugzilla.suse.com/1132589" }, { "category": "self", "summary": "SUSE Bug 1132618", "url": "https://bugzilla.suse.com/1132618" }, { "category": "self", "summary": "SUSE Bug 1132673", "url": "https://bugzilla.suse.com/1132673" }, { "category": "self", "summary": "SUSE Bug 1132681", "url": "https://bugzilla.suse.com/1132681" }, { "category": "self", "summary": "SUSE Bug 1132726", "url": "https://bugzilla.suse.com/1132726" }, { "category": "self", "summary": "SUSE Bug 1132828", "url": "https://bugzilla.suse.com/1132828" }, { "category": "self", "summary": "SUSE Bug 1132894", "url": "https://bugzilla.suse.com/1132894" }, { "category": "self", "summary": "SUSE Bug 1132943", "url": "https://bugzilla.suse.com/1132943" }, { "category": "self", "summary": "SUSE Bug 1132982", "url": "https://bugzilla.suse.com/1132982" }, { "category": "self", "summary": "SUSE Bug 1133005", "url": "https://bugzilla.suse.com/1133005" }, { "category": "self", "summary": "SUSE Bug 1133016", "url": "https://bugzilla.suse.com/1133016" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1133094", "url": "https://bugzilla.suse.com/1133094" }, { "category": "self", "summary": "SUSE Bug 1133095", "url": "https://bugzilla.suse.com/1133095" }, { "category": "self", "summary": "SUSE Bug 1133115", "url": "https://bugzilla.suse.com/1133115" }, { "category": "self", "summary": "SUSE Bug 1133149", "url": "https://bugzilla.suse.com/1133149" }, { "category": "self", "summary": "SUSE Bug 1133176", "url": "https://bugzilla.suse.com/1133176" }, { "category": "self", "summary": "SUSE Bug 1133188", "url": "https://bugzilla.suse.com/1133188" }, { "category": "self", "summary": "SUSE Bug 1133190", "url": "https://bugzilla.suse.com/1133190" }, { "category": "self", "summary": "SUSE Bug 1133311", "url": "https://bugzilla.suse.com/1133311" }, { "category": "self", "summary": "SUSE Bug 1133320", "url": "https://bugzilla.suse.com/1133320" }, { "category": "self", "summary": "SUSE Bug 1133401", "url": "https://bugzilla.suse.com/1133401" }, { "category": "self", "summary": "SUSE Bug 1133486", "url": "https://bugzilla.suse.com/1133486" }, { "category": "self", "summary": "SUSE Bug 1133529", "url": "https://bugzilla.suse.com/1133529" }, { "category": "self", "summary": "SUSE Bug 1133547", "url": "https://bugzilla.suse.com/1133547" }, { "category": "self", "summary": "SUSE Bug 1133584", "url": "https://bugzilla.suse.com/1133584" }, { "category": "self", "summary": "SUSE Bug 1133593", "url": "https://bugzilla.suse.com/1133593" }, { "category": "self", "summary": "SUSE Bug 1133612", "url": "https://bugzilla.suse.com/1133612" }, { "category": "self", "summary": "SUSE Bug 1133616", "url": "https://bugzilla.suse.com/1133616" }, { "category": "self", "summary": "SUSE Bug 1133667", "url": "https://bugzilla.suse.com/1133667" }, { "category": "self", "summary": "SUSE Bug 1133668", "url": "https://bugzilla.suse.com/1133668" }, { "category": "self", "summary": "SUSE Bug 1133672", "url": "https://bugzilla.suse.com/1133672" }, { "category": "self", "summary": "SUSE Bug 1133674", "url": "https://bugzilla.suse.com/1133674" }, { "category": "self", "summary": "SUSE Bug 1133675", "url": "https://bugzilla.suse.com/1133675" }, { "category": "self", "summary": "SUSE Bug 1133698", "url": "https://bugzilla.suse.com/1133698" }, { "category": "self", "summary": "SUSE Bug 1133702", "url": "https://bugzilla.suse.com/1133702" }, { "category": "self", "summary": "SUSE Bug 1133731", "url": "https://bugzilla.suse.com/1133731" }, { "category": "self", "summary": "SUSE Bug 1133738", "url": "https://bugzilla.suse.com/1133738" }, { "category": "self", "summary": "SUSE Bug 1133769", "url": "https://bugzilla.suse.com/1133769" }, { "category": "self", "summary": "SUSE Bug 1133772", "url": "https://bugzilla.suse.com/1133772" }, { "category": "self", "summary": "SUSE Bug 1133774", "url": "https://bugzilla.suse.com/1133774" }, { "category": "self", "summary": "SUSE Bug 1133778", "url": "https://bugzilla.suse.com/1133778" }, { "category": "self", "summary": "SUSE Bug 1133779", "url": "https://bugzilla.suse.com/1133779" }, { "category": "self", "summary": "SUSE Bug 1133780", "url": "https://bugzilla.suse.com/1133780" }, { "category": "self", "summary": "SUSE Bug 1133825", "url": "https://bugzilla.suse.com/1133825" }, { "category": "self", "summary": "SUSE Bug 1133850", "url": "https://bugzilla.suse.com/1133850" }, { "category": "self", "summary": "SUSE Bug 1133851", "url": "https://bugzilla.suse.com/1133851" }, { "category": "self", "summary": "SUSE Bug 1133852", "url": "https://bugzilla.suse.com/1133852" }, { "category": "self", "summary": "SUSE Bug 1133897", "url": "https://bugzilla.suse.com/1133897" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134160", "url": "https://bugzilla.suse.com/1134160" }, { "category": "self", "summary": "SUSE Bug 1134162", "url": "https://bugzilla.suse.com/1134162" }, { "category": "self", "summary": "SUSE Bug 1134199", "url": "https://bugzilla.suse.com/1134199" }, { "category": "self", "summary": "SUSE Bug 1134200", "url": "https://bugzilla.suse.com/1134200" }, { "category": "self", "summary": "SUSE Bug 1134201", "url": "https://bugzilla.suse.com/1134201" }, { "category": "self", "summary": "SUSE Bug 1134202", "url": "https://bugzilla.suse.com/1134202" }, { "category": "self", "summary": "SUSE Bug 1134203", "url": "https://bugzilla.suse.com/1134203" }, { "category": "self", "summary": "SUSE Bug 1134204", "url": "https://bugzilla.suse.com/1134204" }, { "category": "self", "summary": "SUSE Bug 1134205", "url": "https://bugzilla.suse.com/1134205" }, { "category": "self", "summary": "SUSE Bug 1134223", "url": "https://bugzilla.suse.com/1134223" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1134354", "url": "https://bugzilla.suse.com/1134354" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134393", "url": "https://bugzilla.suse.com/1134393" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134397", "url": "https://bugzilla.suse.com/1134397" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1134459", "url": "https://bugzilla.suse.com/1134459" }, { "category": "self", "summary": "SUSE Bug 1134460", "url": "https://bugzilla.suse.com/1134460" }, { "category": "self", "summary": "SUSE Bug 1134461", "url": "https://bugzilla.suse.com/1134461" }, { "category": "self", "summary": "SUSE Bug 1134597", "url": "https://bugzilla.suse.com/1134597" }, { "category": "self", "summary": "SUSE Bug 1134600", "url": "https://bugzilla.suse.com/1134600" }, { "category": "self", "summary": "SUSE Bug 1134607", "url": "https://bugzilla.suse.com/1134607" }, { "category": "self", "summary": "SUSE Bug 1134618", "url": "https://bugzilla.suse.com/1134618" }, { "category": "self", "summary": "SUSE Bug 1134651", "url": "https://bugzilla.suse.com/1134651" }, { "category": "self", "summary": "SUSE Bug 1134671", "url": "https://bugzilla.suse.com/1134671" }, { "category": "self", "summary": "SUSE Bug 1134730", "url": "https://bugzilla.suse.com/1134730" }, { "category": "self", "summary": "SUSE Bug 1134738", "url": "https://bugzilla.suse.com/1134738" }, { "category": "self", "summary": "SUSE Bug 1134743", "url": "https://bugzilla.suse.com/1134743" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1134806", "url": "https://bugzilla.suse.com/1134806" }, { "category": "self", "summary": "SUSE Bug 1134810", "url": "https://bugzilla.suse.com/1134810" }, { "category": "self", "summary": "SUSE Bug 1134813", "url": "https://bugzilla.suse.com/1134813" }, { "category": "self", "summary": "SUSE Bug 1134848", "url": "https://bugzilla.suse.com/1134848" }, { "category": "self", "summary": "SUSE Bug 1134936", "url": "https://bugzilla.suse.com/1134936" }, { "category": "self", "summary": "SUSE Bug 1134945", "url": "https://bugzilla.suse.com/1134945" }, { "category": "self", "summary": "SUSE Bug 1134946", "url": "https://bugzilla.suse.com/1134946" }, { "category": "self", "summary": "SUSE Bug 1134947", "url": "https://bugzilla.suse.com/1134947" }, { "category": "self", "summary": "SUSE Bug 1134948", "url": "https://bugzilla.suse.com/1134948" }, { "category": "self", "summary": "SUSE Bug 1134949", "url": "https://bugzilla.suse.com/1134949" }, { "category": "self", "summary": "SUSE Bug 1134950", "url": "https://bugzilla.suse.com/1134950" }, { "category": "self", "summary": "SUSE Bug 1134951", "url": "https://bugzilla.suse.com/1134951" }, { "category": "self", "summary": "SUSE Bug 1134952", "url": "https://bugzilla.suse.com/1134952" }, { "category": "self", "summary": "SUSE Bug 1134953", "url": "https://bugzilla.suse.com/1134953" }, { "category": "self", "summary": "SUSE Bug 1134972", "url": "https://bugzilla.suse.com/1134972" }, { "category": "self", "summary": "SUSE Bug 1134974", "url": "https://bugzilla.suse.com/1134974" }, { "category": "self", "summary": "SUSE Bug 1134975", "url": "https://bugzilla.suse.com/1134975" }, { "category": "self", "summary": "SUSE Bug 1134980", "url": "https://bugzilla.suse.com/1134980" }, { "category": "self", "summary": "SUSE Bug 1134981", "url": "https://bugzilla.suse.com/1134981" }, { "category": "self", "summary": "SUSE Bug 1134983", "url": "https://bugzilla.suse.com/1134983" }, { "category": "self", "summary": "SUSE Bug 1134987", "url": "https://bugzilla.suse.com/1134987" }, { "category": "self", "summary": "SUSE Bug 1134989", "url": "https://bugzilla.suse.com/1134989" }, { "category": "self", "summary": "SUSE Bug 1134990", "url": "https://bugzilla.suse.com/1134990" }, { "category": "self", "summary": "SUSE Bug 1134994", "url": "https://bugzilla.suse.com/1134994" }, { "category": "self", "summary": "SUSE Bug 1134995", "url": "https://bugzilla.suse.com/1134995" }, { "category": "self", "summary": "SUSE Bug 1134998", "url": "https://bugzilla.suse.com/1134998" }, { "category": "self", "summary": "SUSE Bug 1134999", "url": "https://bugzilla.suse.com/1134999" }, { "category": "self", "summary": "SUSE Bug 1135006", "url": "https://bugzilla.suse.com/1135006" }, { "category": "self", "summary": "SUSE Bug 1135007", "url": "https://bugzilla.suse.com/1135007" }, { "category": "self", "summary": "SUSE Bug 1135008", "url": "https://bugzilla.suse.com/1135008" }, { "category": "self", "summary": "SUSE Bug 1135018", "url": "https://bugzilla.suse.com/1135018" }, { "category": "self", "summary": "SUSE Bug 1135021", "url": "https://bugzilla.suse.com/1135021" }, { "category": "self", "summary": "SUSE Bug 1135024", "url": "https://bugzilla.suse.com/1135024" }, { "category": "self", "summary": "SUSE Bug 1135026", "url": "https://bugzilla.suse.com/1135026" }, { "category": "self", "summary": "SUSE Bug 1135027", "url": "https://bugzilla.suse.com/1135027" }, { "category": "self", "summary": "SUSE Bug 1135028", "url": "https://bugzilla.suse.com/1135028" }, { "category": "self", "summary": "SUSE Bug 1135029", "url": "https://bugzilla.suse.com/1135029" }, { "category": "self", "summary": "SUSE Bug 1135031", "url": "https://bugzilla.suse.com/1135031" }, { "category": "self", "summary": "SUSE Bug 1135033", "url": "https://bugzilla.suse.com/1135033" }, { "category": "self", "summary": "SUSE Bug 1135034", "url": "https://bugzilla.suse.com/1135034" }, { "category": "self", "summary": "SUSE Bug 1135035", "url": "https://bugzilla.suse.com/1135035" }, { "category": "self", "summary": "SUSE Bug 1135036", "url": "https://bugzilla.suse.com/1135036" }, { "category": "self", "summary": "SUSE Bug 1135037", "url": "https://bugzilla.suse.com/1135037" }, { "category": "self", "summary": "SUSE Bug 1135038", "url": "https://bugzilla.suse.com/1135038" }, { "category": "self", "summary": "SUSE Bug 1135039", "url": "https://bugzilla.suse.com/1135039" }, { "category": "self", "summary": "SUSE Bug 1135041", "url": "https://bugzilla.suse.com/1135041" }, { "category": "self", "summary": "SUSE Bug 1135042", "url": "https://bugzilla.suse.com/1135042" }, { "category": "self", "summary": "SUSE Bug 1135044", "url": "https://bugzilla.suse.com/1135044" }, { "category": "self", "summary": "SUSE Bug 1135045", "url": "https://bugzilla.suse.com/1135045" }, { "category": "self", "summary": "SUSE Bug 1135046", "url": "https://bugzilla.suse.com/1135046" }, { "category": "self", "summary": "SUSE Bug 1135047", "url": "https://bugzilla.suse.com/1135047" }, { "category": "self", "summary": "SUSE Bug 1135049", "url": "https://bugzilla.suse.com/1135049" }, { "category": "self", "summary": "SUSE Bug 1135051", "url": "https://bugzilla.suse.com/1135051" }, { "category": "self", "summary": "SUSE Bug 1135052", "url": "https://bugzilla.suse.com/1135052" }, { "category": "self", "summary": "SUSE Bug 1135053", "url": "https://bugzilla.suse.com/1135053" }, { "category": "self", "summary": "SUSE Bug 1135055", "url": "https://bugzilla.suse.com/1135055" }, { "category": "self", "summary": "SUSE Bug 1135056", "url": "https://bugzilla.suse.com/1135056" }, { "category": "self", "summary": "SUSE Bug 1135058", "url": "https://bugzilla.suse.com/1135058" }, { "category": "self", "summary": "SUSE Bug 1135100", "url": "https://bugzilla.suse.com/1135100" }, { "category": "self", "summary": "SUSE Bug 1135120", "url": "https://bugzilla.suse.com/1135120" }, { "category": "self", "summary": "SUSE Bug 1135153", "url": "https://bugzilla.suse.com/1135153" }, { "category": "self", "summary": "SUSE Bug 1135278", "url": "https://bugzilla.suse.com/1135278" }, { "category": "self", "summary": "SUSE Bug 1135281", "url": "https://bugzilla.suse.com/1135281" }, { "category": "self", "summary": "SUSE Bug 1135296", "url": "https://bugzilla.suse.com/1135296" }, { "category": "self", "summary": "SUSE Bug 1135309", "url": "https://bugzilla.suse.com/1135309" }, { "category": "self", "summary": "SUSE Bug 1135312", "url": "https://bugzilla.suse.com/1135312" }, { "category": "self", "summary": "SUSE Bug 1135314", "url": "https://bugzilla.suse.com/1135314" }, { "category": "self", "summary": "SUSE Bug 1135315", "url": "https://bugzilla.suse.com/1135315" }, { "category": "self", "summary": "SUSE Bug 1135316", "url": "https://bugzilla.suse.com/1135316" }, { "category": "self", "summary": "SUSE Bug 1135320", "url": "https://bugzilla.suse.com/1135320" }, { "category": "self", "summary": "SUSE Bug 1135323", "url": "https://bugzilla.suse.com/1135323" }, { "category": "self", "summary": "SUSE Bug 1135330", "url": "https://bugzilla.suse.com/1135330" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135492", "url": "https://bugzilla.suse.com/1135492" }, { "category": "self", "summary": "SUSE Bug 1135542", "url": "https://bugzilla.suse.com/1135542" }, { "category": "self", "summary": "SUSE Bug 1135556", "url": "https://bugzilla.suse.com/1135556" }, { "category": "self", "summary": "SUSE Bug 1135603", "url": "https://bugzilla.suse.com/1135603" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135661", "url": "https://bugzilla.suse.com/1135661" }, { "category": "self", "summary": "SUSE Bug 1135758", "url": "https://bugzilla.suse.com/1135758" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1136156", "url": "https://bugzilla.suse.com/1136156" }, { "category": "self", "summary": "SUSE Bug 1136157", "url": "https://bugzilla.suse.com/1136157" }, { "category": "self", "summary": "SUSE Bug 1136161", "url": "https://bugzilla.suse.com/1136161" }, { "category": "self", "summary": "SUSE Bug 1136188", "url": "https://bugzilla.suse.com/1136188" }, { "category": "self", "summary": "SUSE Bug 1136206", "url": "https://bugzilla.suse.com/1136206" }, { "category": "self", "summary": "SUSE Bug 1136215", "url": "https://bugzilla.suse.com/1136215" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136264", "url": "https://bugzilla.suse.com/1136264" }, { "category": "self", "summary": "SUSE Bug 1136271", "url": "https://bugzilla.suse.com/1136271" }, { "category": "self", "summary": "SUSE Bug 1136333", "url": "https://bugzilla.suse.com/1136333" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136343", "url": "https://bugzilla.suse.com/1136343" }, { "category": "self", "summary": "SUSE Bug 1136345", "url": "https://bugzilla.suse.com/1136345" }, { "category": "self", "summary": "SUSE Bug 1136347", "url": "https://bugzilla.suse.com/1136347" }, { "category": "self", "summary": "SUSE Bug 1136348", "url": "https://bugzilla.suse.com/1136348" }, { "category": "self", "summary": "SUSE Bug 1136353", "url": "https://bugzilla.suse.com/1136353" }, { "category": "self", "summary": "SUSE Bug 1136424", "url": "https://bugzilla.suse.com/1136424" }, { "category": "self", "summary": "SUSE Bug 1136428", "url": "https://bugzilla.suse.com/1136428" }, { "category": "self", "summary": "SUSE Bug 1136430", "url": "https://bugzilla.suse.com/1136430" }, { "category": "self", "summary": "SUSE Bug 1136432", "url": "https://bugzilla.suse.com/1136432" }, { "category": "self", "summary": "SUSE Bug 1136434", "url": "https://bugzilla.suse.com/1136434" }, { "category": "self", "summary": "SUSE Bug 1136435", "url": "https://bugzilla.suse.com/1136435" }, { "category": "self", "summary": "SUSE Bug 1136438", "url": "https://bugzilla.suse.com/1136438" }, { "category": "self", "summary": "SUSE Bug 1136439", "url": "https://bugzilla.suse.com/1136439" }, { "category": "self", "summary": "SUSE Bug 1136456", "url": "https://bugzilla.suse.com/1136456" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136462", "url": "https://bugzilla.suse.com/1136462" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1136469", "url": "https://bugzilla.suse.com/1136469" }, { "category": "self", "summary": "SUSE Bug 1136477", "url": "https://bugzilla.suse.com/1136477" }, { "category": "self", "summary": "SUSE Bug 1136478", "url": "https://bugzilla.suse.com/1136478" }, { "category": "self", "summary": "SUSE Bug 1136498", "url": "https://bugzilla.suse.com/1136498" }, { "category": "self", "summary": "SUSE Bug 1136573", "url": "https://bugzilla.suse.com/1136573" }, { "category": "self", "summary": "SUSE Bug 1136586", "url": "https://bugzilla.suse.com/1136586" }, { "category": "self", "summary": "SUSE Bug 1136598", "url": "https://bugzilla.suse.com/1136598" }, { "category": "self", "summary": "SUSE Bug 1136881", "url": "https://bugzilla.suse.com/1136881" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1136935", "url": "https://bugzilla.suse.com/1136935" }, { "category": "self", "summary": "SUSE Bug 1136978", "url": "https://bugzilla.suse.com/1136978" }, { "category": "self", "summary": "SUSE Bug 1136990", "url": "https://bugzilla.suse.com/1136990" }, { "category": "self", "summary": "SUSE Bug 1137103", "url": "https://bugzilla.suse.com/1137103" }, { "category": "self", "summary": "SUSE Bug 1137151", "url": "https://bugzilla.suse.com/1137151" }, { "category": "self", "summary": "SUSE Bug 1137152", "url": "https://bugzilla.suse.com/1137152" }, { "category": "self", "summary": "SUSE Bug 1137153", "url": "https://bugzilla.suse.com/1137153" }, { "category": "self", "summary": "SUSE Bug 1137162", "url": "https://bugzilla.suse.com/1137162" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1137201", "url": "https://bugzilla.suse.com/1137201" }, { "category": "self", "summary": "SUSE Bug 1137224", "url": "https://bugzilla.suse.com/1137224" }, { "category": "self", "summary": "SUSE Bug 1137232", "url": "https://bugzilla.suse.com/1137232" }, { "category": "self", "summary": "SUSE Bug 1137233", "url": "https://bugzilla.suse.com/1137233" }, { "category": "self", "summary": "SUSE Bug 1137236", "url": "https://bugzilla.suse.com/1137236" }, { "category": "self", "summary": "SUSE Bug 1137366", "url": "https://bugzilla.suse.com/1137366" }, { "category": "self", "summary": "SUSE Bug 1137372", "url": "https://bugzilla.suse.com/1137372" }, { "category": "self", "summary": "SUSE Bug 1137429", "url": "https://bugzilla.suse.com/1137429" }, { "category": "self", "summary": "SUSE Bug 1137444", "url": "https://bugzilla.suse.com/1137444" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137625", "url": "https://bugzilla.suse.com/1137625" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1137739", "url": "https://bugzilla.suse.com/1137739" }, { "category": "self", "summary": "SUSE Bug 1137752", "url": "https://bugzilla.suse.com/1137752" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1137884", "url": "https://bugzilla.suse.com/1137884" }, { "category": "self", "summary": "SUSE Bug 1137985", "url": "https://bugzilla.suse.com/1137985" }, { "category": "self", "summary": "SUSE Bug 1137995", "url": "https://bugzilla.suse.com/1137995" }, { "category": "self", "summary": "SUSE Bug 1137996", "url": "https://bugzilla.suse.com/1137996" }, { "category": "self", "summary": "SUSE Bug 1137998", "url": "https://bugzilla.suse.com/1137998" }, { "category": "self", "summary": "SUSE Bug 1137999", "url": "https://bugzilla.suse.com/1137999" }, { "category": "self", "summary": "SUSE Bug 1138000", "url": "https://bugzilla.suse.com/1138000" }, { "category": "self", "summary": "SUSE Bug 1138002", "url": "https://bugzilla.suse.com/1138002" }, { "category": "self", "summary": "SUSE Bug 1138003", "url": "https://bugzilla.suse.com/1138003" }, { "category": "self", "summary": "SUSE Bug 1138005", "url": "https://bugzilla.suse.com/1138005" }, { "category": "self", "summary": "SUSE Bug 1138006", "url": "https://bugzilla.suse.com/1138006" }, { "category": "self", "summary": "SUSE Bug 1138007", "url": "https://bugzilla.suse.com/1138007" }, { "category": "self", "summary": "SUSE Bug 1138008", "url": "https://bugzilla.suse.com/1138008" }, { "category": "self", "summary": "SUSE Bug 1138009", "url": "https://bugzilla.suse.com/1138009" }, { "category": "self", "summary": "SUSE Bug 1138010", "url": "https://bugzilla.suse.com/1138010" }, { "category": "self", "summary": "SUSE Bug 1138011", "url": "https://bugzilla.suse.com/1138011" }, { "category": "self", "summary": "SUSE Bug 1138012", "url": "https://bugzilla.suse.com/1138012" }, { "category": "self", "summary": "SUSE Bug 1138013", "url": "https://bugzilla.suse.com/1138013" }, { "category": "self", "summary": "SUSE Bug 1138014", "url": "https://bugzilla.suse.com/1138014" }, { "category": "self", "summary": "SUSE Bug 1138015", "url": "https://bugzilla.suse.com/1138015" }, { "category": "self", "summary": "SUSE Bug 1138016", "url": "https://bugzilla.suse.com/1138016" }, { "category": "self", "summary": "SUSE Bug 1138017", "url": "https://bugzilla.suse.com/1138017" }, { "category": "self", "summary": "SUSE Bug 1138018", "url": "https://bugzilla.suse.com/1138018" }, { "category": "self", "summary": "SUSE Bug 1138019", "url": "https://bugzilla.suse.com/1138019" }, { "category": "self", "summary": "SUSE Bug 1138263", "url": "https://bugzilla.suse.com/1138263" }, { "category": "self", "summary": "SUSE Bug 1138291", "url": "https://bugzilla.suse.com/1138291" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1138336", "url": "https://bugzilla.suse.com/1138336" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1138375", "url": "https://bugzilla.suse.com/1138375" }, { "category": "self", "summary": "SUSE Bug 1138589", "url": "https://bugzilla.suse.com/1138589" }, { "category": "self", "summary": "SUSE Bug 1138681", "url": "https://bugzilla.suse.com/1138681" }, { "category": "self", "summary": "SUSE Bug 1138719", "url": "https://bugzilla.suse.com/1138719" }, { "category": "self", "summary": "SUSE Bug 1138732", "url": "https://bugzilla.suse.com/1138732" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1138879", "url": "https://bugzilla.suse.com/1138879" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1139712", "url": "https://bugzilla.suse.com/1139712" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1139771", "url": "https://bugzilla.suse.com/1139771" }, { "category": "self", "summary": "SUSE Bug 1139865", "url": "https://bugzilla.suse.com/1139865" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140228", "url": "https://bugzilla.suse.com/1140228" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140328", "url": "https://bugzilla.suse.com/1140328" }, { "category": "self", "summary": "SUSE Bug 1140405", "url": "https://bugzilla.suse.com/1140405" }, { "category": "self", "summary": "SUSE Bug 1140424", "url": "https://bugzilla.suse.com/1140424" }, { "category": "self", "summary": "SUSE Bug 1140428", "url": "https://bugzilla.suse.com/1140428" }, { "category": "self", "summary": "SUSE Bug 1140454", "url": "https://bugzilla.suse.com/1140454" }, { "category": "self", "summary": "SUSE Bug 1140463", "url": "https://bugzilla.suse.com/1140463" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140575", "url": "https://bugzilla.suse.com/1140575" }, { "category": "self", "summary": "SUSE Bug 1140577", "url": "https://bugzilla.suse.com/1140577" }, { "category": "self", "summary": "SUSE Bug 1140637", "url": "https://bugzilla.suse.com/1140637" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140658", "url": "https://bugzilla.suse.com/1140658" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140715", "url": "https://bugzilla.suse.com/1140715" }, { "category": "self", "summary": "SUSE Bug 1140719", "url": "https://bugzilla.suse.com/1140719" }, { "category": "self", "summary": "SUSE Bug 1140726", "url": "https://bugzilla.suse.com/1140726" }, { "category": "self", "summary": "SUSE Bug 1140727", "url": "https://bugzilla.suse.com/1140727" }, { "category": "self", "summary": "SUSE Bug 1140728", "url": "https://bugzilla.suse.com/1140728" }, { "category": "self", "summary": "SUSE Bug 1140814", "url": "https://bugzilla.suse.com/1140814" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142083", "url": "https://bugzilla.suse.com/1142083" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12127 page", "url": "https://www.suse.com/security/cve/CVE-2018-12127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16871 page", "url": "https://www.suse.com/security/cve/CVE-2018-16871/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16880 page", "url": "https://www.suse.com/security/cve/CVE-2018-16880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7191 page", "url": "https://www.suse.com/security/cve/CVE-2018-7191/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10124 page", "url": "https://www.suse.com/security/cve/CVE-2019-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10638 page", "url": "https://www.suse.com/security/cve/CVE-2019-10638/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10639 page", "url": "https://www.suse.com/security/cve/CVE-2019-10639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11085 page", "url": "https://www.suse.com/security/cve/CVE-2019-11085/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11091 page", "url": "https://www.suse.com/security/cve/CVE-2019-11091/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11486 page", "url": "https://www.suse.com/security/cve/CVE-2019-11486/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11487 page", "url": "https://www.suse.com/security/cve/CVE-2019-11487/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11599 page", "url": "https://www.suse.com/security/cve/CVE-2019-11599/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11811 page", "url": "https://www.suse.com/security/cve/CVE-2019-11811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11815 page", "url": "https://www.suse.com/security/cve/CVE-2019-11815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11833 page", "url": "https://www.suse.com/security/cve/CVE-2019-11833/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11884 page", "url": "https://www.suse.com/security/cve/CVE-2019-11884/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12380 page", "url": "https://www.suse.com/security/cve/CVE-2019-12380/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12382 page", "url": "https://www.suse.com/security/cve/CVE-2019-12382/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12817 page", "url": "https://www.suse.com/security/cve/CVE-2019-12817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12819 page", "url": "https://www.suse.com/security/cve/CVE-2019-12819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13233 page", "url": "https://www.suse.com/security/cve/CVE-2019-13233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5489 page", "url": "https://www.suse.com/security/cve/CVE-2019-5489/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9003 page", "url": "https://www.suse.com/security/cve/CVE-2019-9003/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9503 page", "url": "https://www.suse.com/security/cve/CVE-2019-9503/" }, { "category": "self", "summary": "SUSE Bug SLE-4678", "url": "https://bugzilla.suse.com/SLE-4678" }, { "category": "self", "summary": "SUSE Bug SLE-4679", "url": "https://bugzilla.suse.com/SLE-4679" }, { "category": "self", "summary": "SUSE Bug SLE-4681", "url": "https://bugzilla.suse.com/SLE-4681" }, { "category": "self", "summary": "SUSE Bug SLE-4683", "url": "https://bugzilla.suse.com/SLE-4683" }, { "category": "self", "summary": "SUSE Bug SLE-4684", "url": "https://bugzilla.suse.com/SLE-4684" }, { "category": "self", "summary": "SUSE Bug SLE-4688", "url": "https://bugzilla.suse.com/SLE-4688" }, { "category": "self", "summary": "SUSE Bug SLE-4689", "url": "https://bugzilla.suse.com/SLE-4689" }, { "category": "self", "summary": "SUSE Bug SLE-4692", "url": "https://bugzilla.suse.com/SLE-4692" }, { "category": "self", "summary": "SUSE Bug SLE-4693", "url": "https://bugzilla.suse.com/SLE-4693" }, { "category": "self", "summary": "SUSE Bug SLE-4694", "url": "https://bugzilla.suse.com/SLE-4694" }, { "category": "self", "summary": "SUSE Bug SLE-4695", "url": "https://bugzilla.suse.com/SLE-4695" }, { "category": "self", "summary": "SUSE Bug SLE-4699", "url": "https://bugzilla.suse.com/SLE-4699" }, { "category": "self", "summary": "SUSE Bug SLE-4710", "url": "https://bugzilla.suse.com/SLE-4710" }, { "category": "self", "summary": "SUSE Bug SLE-4712", "url": "https://bugzilla.suse.com/SLE-4712" }, { "category": "self", "summary": "SUSE Bug SLE-4717", "url": "https://bugzilla.suse.com/SLE-4717" }, { "category": "self", "summary": "SUSE Bug SLE-4721", "url": "https://bugzilla.suse.com/SLE-4721" }, { "category": "self", "summary": "SUSE Bug SLE-4722", "url": "https://bugzilla.suse.com/SLE-4722" }, { "category": "self", "summary": "SUSE Bug SLE-4994", "url": "https://bugzilla.suse.com/SLE-4994" }, { "category": "self", "summary": "SUSE Bug SLE-5759", "url": "https://bugzilla.suse.com/SLE-5759" }, { "category": "self", "summary": "SUSE Bug SLE-5789", "url": "https://bugzilla.suse.com/SLE-5789" }, { "category": "self", "summary": "SUSE Bug SLE-5802", "url": "https://bugzilla.suse.com/SLE-5802" }, { "category": "self", "summary": "SUSE Bug SLE-5954", "url": "https://bugzilla.suse.com/SLE-5954" }, { "category": "self", "summary": "SUSE Bug SLE-6197", "url": "https://bugzilla.suse.com/SLE-6197" } ], "title": "Security update for kernel-source-rt", "tracking": { "current_release_date": "2019-09-23T07:31:22Z", "generator": { "date": "2019-09-23T07:31:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2430-1", "initial_release_date": "2019-09-23T07:31:22Z", "revision_history": [ { "date": "2019-09-23T07:31:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.8.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.8.1.noarch", "product_id": "kernel-devel-rt-4.12.14-14.8.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.8.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.8.1.noarch", "product_id": "kernel-source-rt-4.12.14-14.8.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-base-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.8.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.8.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.8.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.8.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.8.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.8.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12127" } ], "notes": [ { "category": "general", "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12127", "url": "https://www.suse.com/security/cve/CVE-2018-12127" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-12127" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-16871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16871" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16871", "url": "https://www.suse.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "SUSE Bug 1137103 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1137103" }, { "category": "external", "summary": "SUSE Bug 1156320 for CVE-2018-16871", "url": "https://bugzilla.suse.com/1156320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-16871" }, { "cve": "CVE-2018-16880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16880" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16880", "url": "https://www.suse.com/security/cve/CVE-2018-16880" }, { "category": "external", "summary": "SUSE Bug 1122767 for CVE-2018-16880", "url": "https://bugzilla.suse.com/1122767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-16880" }, { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2018-7191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7191" } ], "notes": [ { "category": "general", "text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7191", "url": "https://www.suse.com/security/cve/CVE-2018-7191" }, { "category": "external", "summary": "SUSE Bug 1135603 for CVE-2018-7191", "url": "https://bugzilla.suse.com/1135603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2018-7191" }, { "cve": "CVE-2019-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10124" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10124", "url": "https://www.suse.com/security/cve/CVE-2019-10124" }, { "category": "external", "summary": "SUSE Bug 1130699 for CVE-2019-10124", "url": "https://bugzilla.suse.com/1130699" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-10124" }, { "cve": "CVE-2019-10638", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10638" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10638", "url": "https://www.suse.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "SUSE Bug 1140575 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140575" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1140577" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-10638", "url": "https://bugzilla.suse.com/1142129" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-10638" }, { "cve": "CVE-2019-10639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10639" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10639", "url": "https://www.suse.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "SUSE Bug 1140577 for CVE-2019-10639", "url": "https://bugzilla.suse.com/1140577" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-10639" }, { "cve": "CVE-2019-11085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11085" } ], "notes": [ { "category": "general", "text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11085", "url": "https://www.suse.com/security/cve/CVE-2019-11085" }, { "category": "external", "summary": "SUSE Bug 1135278 for CVE-2019-11085", "url": "https://bugzilla.suse.com/1135278" }, { "category": "external", "summary": "SUSE Bug 1135280 for CVE-2019-11085", "url": "https://bugzilla.suse.com/1135280" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11085" }, { "cve": "CVE-2019-11091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11091" } ], "notes": [ { "category": "general", "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11091", "url": "https://www.suse.com/security/cve/CVE-2019-11091" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1135394 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1135394" }, { "category": "external", "summary": "SUSE Bug 1138043 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138043" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11091" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-11486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11486" } ], "notes": [ { "category": "general", "text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11486", "url": "https://www.suse.com/security/cve/CVE-2019-11486" }, { "category": "external", "summary": "SUSE Bug 1133188 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1133188" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1156434" }, { "category": "external", "summary": "SUSE Bug 1173667 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1173667" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11486" }, { "cve": "CVE-2019-11487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11487" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11487", "url": "https://www.suse.com/security/cve/CVE-2019-11487" }, { "category": "external", "summary": "SUSE Bug 1133190 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133190" }, { "category": "external", "summary": "SUSE Bug 1133191 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11487" }, { "cve": "CVE-2019-11599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11599" } ], "notes": [ { "category": "general", "text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11599", "url": "https://www.suse.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "SUSE Bug 1131645 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1131645" }, { "category": "external", "summary": "SUSE Bug 1133738 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1133738" }, { "category": "external", "summary": "SUSE Bug 1157905 for CVE-2019-11599", "url": "https://bugzilla.suse.com/1157905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-11599" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-11811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11811" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11811", "url": "https://www.suse.com/security/cve/CVE-2019-11811" }, { "category": "external", "summary": "SUSE Bug 1134397 for CVE-2019-11811", "url": "https://bugzilla.suse.com/1134397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-11811" }, { "cve": "CVE-2019-11815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11815" } ], "notes": [ { "category": "general", "text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11815", "url": "https://www.suse.com/security/cve/CVE-2019-11815" }, { "category": "external", "summary": "SUSE Bug 1134537 for CVE-2019-11815", "url": "https://bugzilla.suse.com/1134537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11815" }, { "cve": "CVE-2019-11833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11833" } ], "notes": [ { "category": "general", "text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11833", "url": "https://www.suse.com/security/cve/CVE-2019-11833" }, { "category": "external", "summary": "SUSE Bug 1135281 for CVE-2019-11833", "url": "https://bugzilla.suse.com/1135281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11833" }, { "cve": "CVE-2019-11884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11884" } ], "notes": [ { "category": "general", "text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11884", "url": "https://www.suse.com/security/cve/CVE-2019-11884" }, { "category": "external", "summary": "SUSE Bug 1134848 for CVE-2019-11884", "url": "https://bugzilla.suse.com/1134848" }, { "category": "external", "summary": "SUSE Bug 1139868 for CVE-2019-11884", "url": "https://bugzilla.suse.com/1139868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-11884" }, { "cve": "CVE-2019-12380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12380" } ], "notes": [ { "category": "general", "text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12380", "url": "https://www.suse.com/security/cve/CVE-2019-12380" }, { "category": "external", "summary": "SUSE Bug 1136598 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1136598" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12380", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12380" }, { "cve": "CVE-2019-12382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12382" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12382", "url": "https://www.suse.com/security/cve/CVE-2019-12382" }, { "category": "external", "summary": "SUSE Bug 1136586 for CVE-2019-12382", "url": "https://bugzilla.suse.com/1136586" }, { "category": "external", "summary": "SUSE Bug 1155298 for CVE-2019-12382", "url": "https://bugzilla.suse.com/1155298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12382" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12817" } ], "notes": [ { "category": "general", "text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12817", "url": "https://www.suse.com/security/cve/CVE-2019-12817" }, { "category": "external", "summary": "SUSE Bug 1138263 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138263" }, { "category": "external", "summary": "SUSE Bug 1138264 for CVE-2019-12817", "url": "https://bugzilla.suse.com/1138264" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "important" } ], "title": "CVE-2019-12817" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12818" }, { "cve": "CVE-2019-12819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12819" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12819", "url": "https://www.suse.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "SUSE Bug 1138291 for CVE-2019-12819", "url": "https://bugzilla.suse.com/1138291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-12819" }, { "cve": "CVE-2019-13233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13233" } ], "notes": [ { "category": "general", "text": "In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13233", "url": "https://www.suse.com/security/cve/CVE-2019-13233" }, { "category": "external", "summary": "SUSE Bug 1140454 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1140454" }, { "category": "external", "summary": "SUSE Bug 1144502 for CVE-2019-13233", "url": "https://bugzilla.suse.com/1144502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-13233" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-14284" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-5489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5489" } ], "notes": [ { "category": "general", "text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5489", "url": "https://www.suse.com/security/cve/CVE-2019-5489" }, { "category": "external", "summary": "SUSE Bug 1120843 for CVE-2019-5489", "url": "https://bugzilla.suse.com/1120843" }, { "category": "external", "summary": "SUSE Bug 1120885 for CVE-2019-5489", "url": "https://bugzilla.suse.com/1120885" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-5489" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-9003", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9003" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \"service ipmievd restart\" loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9003", "url": "https://www.suse.com/security/cve/CVE-2019-9003" }, { "category": "external", "summary": "SUSE Bug 1126704 for CVE-2019-9003", "url": "https://bugzilla.suse.com/1126704" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-9003" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2019-9503", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9503" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9503", "url": "https://www.suse.com/security/cve/CVE-2019-9503" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132828" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1156653 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1156653" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-23T07:31:22Z", "details": "moderate" } ], "title": "CVE-2019-9503" } ] }
suse-su-2019:2072-1
Vulnerability from csaf_suse
Published
2019-08-06 22:52
Modified
2019-08-06 22:52
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).
- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).
- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)
- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)
The following non-security bugs were fixed:
- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_unix: remove redundant lockdep class (git-fixes).
- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).
- alsa: compress: Prevent bypasses of set_params (bsc#1051510).
- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- alsa: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- alsa: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- alsa: line6: Fix a typo (bsc#1051510).
- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).
- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- asoc : cs4265 : readable register too low (bsc#1051510).
- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- hid: wacom: correct touch resolution x/y typo (bsc#1051510).
- hid: wacom: generic: Correct pad syncing (bsc#1051510).
- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- input: psmouse - fix build error of multiple definition (bsc#1051510).
- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: fix Guest installation fails by 'Invalid value '0-31' for 'cpuset.cpus': Invalid argument' (bsc#1143507)
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'kvm_vcpu_stat' Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- pci: Always allow probing with driver_override (bsc#1051510).
- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- pci: hv: Remove unused reason for refcount handler (bsc#1142701).
- pci: hv: support reporting serial number as slot information (bsc#1142701).
- pci: Return error if cannot probe VF (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- rds: ib: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- scripts/git_sort/git_sort.py: Add mmots tree.
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
Patchnames
SUSE-2019-2072,SUSE-SLE-DESKTOP-12-SP4-2019-2072,SUSE-SLE-HA-12-SP4-2019-2072,SUSE-SLE-Live-Patching-12-SP4-2019-2072,SUSE-SLE-SDK-12-SP4-2019-2072,SUSE-SLE-SERVER-12-SP4-2019-2072,SUSE-SLE-WE-12-SP4-2019-2072
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n\n\nThe following non-security bugs were fixed:\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189) A dedicated CVE was already assigned\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- asoc : cs4265 : readable register too low (bsc#1051510).\n- asoc: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- asoc: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- hid: wacom: correct touch resolution x/y typo (bsc#1051510).\n- hid: wacom: generic: Correct pad syncing (bsc#1051510).\n- hid: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- hid: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- input: psmouse - fix build error of multiple definition (bsc#1051510).\n- input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: fix Guest installation fails by \u0027Invalid value \u00270-31\u0027 for \u0027cpuset.cpus\u0027: Invalid argument\u0027 (bsc#1143507)\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027 Add halt_no_poll_steal to kvm_vcpu_stat. Hide it from the kABI checker.\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- pci: Always allow probing with driver_override (bsc#1051510).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: Return error if cannot probe VF (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- rds: ib: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- scripts/git_sort/git_sort.py: Add mmots tree.\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- vmci: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2072,SUSE-SLE-DESKTOP-12-SP4-2019-2072,SUSE-SLE-HA-12-SP4-2019-2072,SUSE-SLE-Live-Patching-12-SP4-2019-2072,SUSE-SLE-SDK-12-SP4-2019-2072,SUSE-SLE-SERVER-12-SP4-2019-2072,SUSE-SLE-WE-12-SP4-2019-2072", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2072-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2072-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192072-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2072-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1136896", "url": "https://bugzilla.suse.com/1136896" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-06T22:52:10Z", "generator": { "date": "2019-08-06T22:52:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2072-1", "initial_release_date": "2019-08-06T22:52:10Z", "revision_history": [ { "date": "2019-08-06T22:52:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.29.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.29.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.29.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-al-4.12.14-95.29.1.aarch64", "product_id": "dtb-al-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-95.29.1.aarch64", "product_id": "dtb-allwinner-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-altera-4.12.14-95.29.1.aarch64", "product_id": "dtb-altera-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-amd-4.12.14-95.29.1.aarch64", "product_id": "dtb-amd-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-95.29.1.aarch64", "product_id": "dtb-amlogic-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-apm-4.12.14-95.29.1.aarch64", "product_id": "dtb-apm-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-arm-4.12.14-95.29.1.aarch64", "product_id": "dtb-arm-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-95.29.1.aarch64", "product_id": "dtb-broadcom-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-95.29.1.aarch64", "product_id": "dtb-cavium-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-95.29.1.aarch64", "product_id": "dtb-exynos-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-95.29.1.aarch64", "product_id": "dtb-freescale-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-95.29.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-lg-4.12.14-95.29.1.aarch64", "product_id": "dtb-lg-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-95.29.1.aarch64", "product_id": "dtb-marvell-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-95.29.1.aarch64", "product_id": "dtb-mediatek-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-95.29.1.aarch64", "product_id": "dtb-nvidia-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-95.29.1.aarch64", "product_id": "dtb-qcom-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-95.29.1.aarch64", "product_id": "dtb-renesas-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-95.29.1.aarch64", "product_id": "dtb-rockchip-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-95.29.1.aarch64", "product_id": "dtb-socionext-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-95.29.1.aarch64", "product_id": "dtb-sprd-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-95.29.1.aarch64", "product_id": "dtb-xilinx-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-95.29.1.aarch64", "product": { "name": "dtb-zte-4.12.14-95.29.1.aarch64", "product_id": "dtb-zte-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.29.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.29.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.29.1.aarch64", "product_id": "kernel-default-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.29.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.29.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.29.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.29.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.29.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.29.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.29.1.aarch64", "product_id": "kernel-syms-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.29.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.29.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.29.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.29.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.29.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.29.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.29.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.29.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.29.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.29.1.noarch", "product_id": "kernel-devel-4.12.14-95.29.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.29.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.29.1.noarch", "product_id": "kernel-docs-4.12.14-95.29.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.29.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.29.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.29.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.29.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.29.1.noarch", "product_id": "kernel-macros-4.12.14-95.29.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.29.1.noarch", "product": { "name": "kernel-source-4.12.14-95.29.1.noarch", "product_id": "kernel-source-4.12.14-95.29.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.29.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.29.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.29.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.29.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.29.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.29.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.29.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.29.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.29.1.ppc64le", "product_id": "kernel-default-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.29.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.29.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.29.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.29.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.29.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.29.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.29.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.29.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.29.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.29.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.29.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.29.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.29.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.29.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.29.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.29.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.29.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.29.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-4.12.14-95.29.1.s390x", "product_id": "kernel-default-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.29.1.s390x", "product_id": "kernel-default-base-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.29.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.29.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.29.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.29.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.29.1.s390x", "product_id": "kernel-default-man-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.29.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.29.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.29.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.29.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.29.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.29.1.s390x", "product_id": "kernel-syms-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.29.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.29.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.29.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.29.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.29.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.29.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.29.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.29.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.29.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.29.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.29.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.29.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.29.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.29.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.29.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.29.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.29.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.29.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.29.1.x86_64", "product_id": "kernel-debug-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.29.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.29.1.x86_64", "product_id": "kernel-default-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.29.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.29.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.29.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.29.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.29.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.29.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.29.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.29.1.x86_64", "product_id": "kernel-syms-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.29.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.29.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.29.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.29.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.29.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-06T22:52:10Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
ghsa-99rj-63hw-gv5j
Vulnerability from github
Published
2022-05-24 16:51
Modified
2024-04-04 01:23
Severity ?
VLAI Severity ?
Details
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
{ "affected": [], "aliases": [ "CVE-2019-14284" ], "database_specific": { "cwe_ids": [ "CWE-369" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-26T13:15:00Z", "severity": "MODERATE" }, "details": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "id": "GHSA-99rj-63hw-gv5j", "modified": "2024-04-04T01:23:32Z", "published": "2022-05-24T16:51:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14284" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4497" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4495" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4118-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4117-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4116-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4115-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4114-1" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190905-0002" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "type": "WEB", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2019-14284
Vulnerability from fkie_nvd
Published
2019-07-26 13:15
Modified
2024-11-21 04:26
Severity ?
Summary
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html | ||
cve@mitre.org | http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html | ||
cve@mitre.org | http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html | ||
cve@mitre.org | http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html | ||
cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32 | Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32 | Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html | ||
cve@mitre.org | https://seclists.org/bugtraq/2019/Aug/13 | ||
cve@mitre.org | https://seclists.org/bugtraq/2019/Aug/18 | ||
cve@mitre.org | https://seclists.org/bugtraq/2019/Aug/26 | ||
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190905-0002/ | ||
cve@mitre.org | https://usn.ubuntu.com/4114-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/4115-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/4116-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/4117-1/ | ||
cve@mitre.org | https://usn.ubuntu.com/4118-1/ | ||
cve@mitre.org | https://www.debian.org/security/2019/dsa-4495 | ||
cve@mitre.org | https://www.debian.org/security/2019/dsa-4497 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Aug/13 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Aug/18 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Aug/26 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190905-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4114-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4115-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4116-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4117-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4118-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4495 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4497 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "38844317-DEDF-4600-BA0E-C7D28D8EC200", "versionEndExcluding": "5.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default." }, { "lang": "es", "value": "En el kernel de Linux anterior a versi\u00f3n 5.2.3, el archivo drivers/block/floppy.c, permite una denegaci\u00f3n de servicio mediante la divisi\u00f3n por cero de la funci\u00f3n setup_format_params. Dos ioctls consecutivos pueden desencadenar el error: el primero debe establecer la geometr\u00eda de la unidad con valores .sect y .rate que hacen que F_SECT_PER_TRACK sea cero. A continuaci\u00f3n, se debe llamar a la operaci\u00f3n de formato de disquete. Puede ser activado por un usuario local sin privilegios incluso cuando no se ha insertado un disquete. NOTA: QEMU crea el dispositivo de disquete de por defecto." } ], "id": "CVE-2019-14284", "lastModified": "2024-11-21T04:26:22.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-26T13:15:13.113", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4114-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4115-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4116-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4117-1/" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4118-1/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4495" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2019/dsa-4497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4114-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4115-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4116-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4117-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4118-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2019/dsa-4497" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-369" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2019:1924-1
Vulnerability from csaf_opensuse
Published
2019-08-16 12:25
Modified
2019-08-16 12:25
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-1125: Fix Spectre V1 variant memory disclosure by speculation over the SWAPGS instruction (bsc#1139358).
- CVE-2019-10207: A NULL pointer dereference was possible in the bluetooth stack, which could lead to crashes. (bnc#1123959 bnc#1142857).
- CVE-2018-20855: In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bnc#1143045).
- CVE-2019-14284: drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bnc#1143189).
- CVE-2019-14283: set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bnc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254 bnc#1142265).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bnc#1142023).
The following non-security bugs were fixed:
- 9p: acl: fix uninitialized iattr access (bsc#1051510).
- 9p: p9dirent_read: check network-provided name length (bsc#1051510).
- 9p: pass the correct prototype to read_cache_page (bsc#1051510).
- 9p/rdma: do not disconnect on down_interruptible EAGAIN (bsc#1051510).
- 9p/rdma: remove useless check in cm_event_handler (bsc#1051510).
- 9p/virtio: Add cleanup path in p9_virtio_init (bsc#1051510).
- 9p/xen: Add cleanup path in p9_trans_xen_init (bsc#1051510).
- 9p/xen: fix check for xenbus_read error in front_probe (bsc#1051510).
- Abort file_remove_privs() for non-reg. files (bsc#1140888).
- acpi/arm64: ignore 5.1 FADTs that are reported as 5.0 (bsc#1051510).
- acpi/IORT: Fix off-by-one check in iort_dev_find_its_id() (bsc#1051510).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).
- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).
- acpi: PM: Fix regression in acpi_device_set_power() (bsc#1051510).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_key: fix leaks in key_pol_get_resp and dump_sp (bsc#1051510).
- af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET (networking-stable-19_07_02).
- af_unix: remove redundant lockdep class (git-fixes).
- ALSA: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- ALSA: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- ALSA: compress: Fix regression on compressed capture streams (bsc#1051510).
- ALSA: compress: Prevent bypasses of set_params (bsc#1051510).
- ALSA: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- ALSA: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- ALSA: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- ALSA: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- ALSA: line6: Fix a typo (bsc#1051510).
- ALSA: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- ALSA: pcm: fix lost wakeup event scenarios in snd_pcm_drain (bsc#1051510).
- ALSA: seq: Break too long mutex context in the write loop (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- ALSA: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- ALSA: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- ALSA: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check (bsc#1051510).
- ALSA: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- arm64: KVM: Fix architecturally invalid reset value for FPEXC32_EL2 (bsc#1133021).
- ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1133021).
- ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1 (bsc#1133021).
- ASoC : cs4265 : readable register too low (bsc#1051510).
- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).
- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ata: libahci: do not complain in case of deferred probe (bsc#1051510).
- ath6kl: add some bounds checking (bsc#1051510).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- Bluetooth: 6lowpan: search for destination address in all peers (bsc#1051510).
- Bluetooth: Add SMP workaround Microsoft Surface Precision Mouse bug (bsc#1051510).
- Bluetooth: Check state in l2cap_disconnect_rsp (bsc#1051510).
- Bluetooth: hci_bcsp: Fix memory leak in rx_skb (bsc#1051510).
- Bluetooth: validate BLE connection interval updates (bsc#1051510).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bonding: Always enable vlan tx offload (networking-stable-19_07_02).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).
- btrfs: scrub: add memalloc_nofs protection around init_ipath (bsc#1086103).
- btrfs: use GFP_KERNEL in init_ipath (bsc#1086103).
- ceph: fix iov_iter issues in ceph_direct_read_write() (bsc#1141450).
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - fix skcipher failure due to wrong output IV (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#11123080).
- dax: Fix xarray entry association for mixed mappings (bsc#1140893).
- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).
- dma-buf: balance refcount inbalance (bsc#1051510).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- Documentation: Add nospectre_v1 parameter (bsc#1051510).
- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).
- Documentation/networking: fix default_ttl typo in mpls-sysctl (bsc#1051510).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- driver core: Fix use-after-free and double free on glue directory (bsc#1131281).
- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).
- drm/bridge: sii902x: pixel clock unit is 10kHz instead of 1kHz (bsc#1051510).
- drm/bridge: tc358767: read display_props in get_modes() (bsc#1051510).
- drm/crc-debugfs: User irqsafe spinlock in drm_crtc_add_crc_entry (bsc#1051510).
- drm/i915/dmc: protect against reading random memory (bsc#1051510).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm: Depopulate platform on probe failure (bsc#1051510).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/panel: simple: Fix panel_simple_dsi_probe (bsc#1051510).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/virtio: Add memory barriers for capset cache (bsc#1051510).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- eCryptfs: fix a couple type promotion bugs (bsc#1051510).
- EDAC: Fix global-out-of-bounds write when setting edac_mc_poll_msec (bsc#1114279).
- efi/bgrt: Drop BGRT status field reserved bits check (bsc#1051510).
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).
- firmware: ti_sci: Always request response from firmware (bsc#1051510).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).
- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).
- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).
- gpio: omap: ensure irq is enabled before wakeup (bsc#1051510).
- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).
- HID: wacom: correct touch resolution x/y typo (bsc#1051510).
- HID: wacom: generic: Correct pad syncing (bsc#1051510).
- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- hpet: Fix division by zero in hpet_time_div() (bsc#1051510).
- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).
- hwmon: (nct6775) Fix register address and added missed tolerance for nct6106 (bsc#1051510).
- iio: iio-utils: Fix possible incorrect mask calculation (bsc#1051510).
- Input: alps - do not handle ALPS cs19 trackpoint-only device (bsc#1051510).
- Input: alps - fix a mismatch between a condition check and its comment (bsc#1051510).
- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- Input: psmouse - fix build error of multiple definition (bsc#1051510).
- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- Input: synaptics - whitelist Lenovo T580 SMBus intertouch (bsc#1051510).
- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- Input: trackpoint - only expose supported controls for Elan, ALPS and NXP (bsc#1051510).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- intel_th: pci: Add Ice Lake NNPI support (bsc#1051510).
- iommu/amd: Make iommu_disable safer (bsc#1140955).
- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).
- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).
- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).
- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).
- iommu: Use right function to get group for device (bsc#1140958).
- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).
- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).
- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).
- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).
- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).
- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- KVM: arm64: Fix caching of host MDCR_EL2 value (bsc#1133021).
- KVM: arm/arm64: Close VMID generation race (bsc#1133021).
- KVM: arm/arm64: Convert kvm_host_cpu_state to a static per-cpu allocation (bsc#1133021).
- KVM: arm/arm64: Drop resource size check for GICV window (bsc#1133021).
- KVM: arm/arm64: Fix lost IRQs from emulated physcial timer when blocked (bsc#1133021).
- KVM: arm/arm64: Fix VMID alloc race by reverting to lock-less (bsc#1133021).
- KVM: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1133021).
- KVM: arm/arm64: Reduce verbosity of KVM init log (bsc#1133021).
- KVM: arm/arm64: Set dist->spis to NULL after kfree (bsc#1133021).
- KVM: arm/arm64: Skip updating PMD entry if no change (bsc#1133021).
- KVM: arm/arm64: Skip updating PTE entry if no change (bsc#1133021).
- KVM: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1133021).
- KVM: arm/arm64: vgic: Fix kvm_device leak in vgic_its_destroy (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix potential overrun in vgic_copy_lpi_list (bsc#1133021).
- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1133021).
- kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init (bsc#1133021).
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- KVM: mmu: Fix overlap between public and private memslots (bsc#1133021).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- KVM: polling: add architecture backend to disable polling (bsc#1119222).
- KVM: Reject device ioctls from processes other than the VM's creator (bsc#1133021).
- KVM: s390: change default halt poll time to 50us (bsc#1119222).
- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- KVM: s390: fix typo in parameter description (bsc#1119222).
- KVM: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).
- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- KVM: x86: fix return value for reserved EFER (bsc#1140992).
- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- libata: do not request sense data on !ZAC ATA devices (bsc#1051510).
- libata: zpodd: Fix small read overflow in zpodd_get_mech_type() (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- libceph: add osd_req_op_extent_osd_data_bvecs() (bsc#1141450).
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: handle zero-length data items (bsc#1141450).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce BVECS data type (bsc#1141450).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: new bio handling code (aka do not clone bios) (bsc#1141450).
- libceph: use single request data item for cmp/setxattr (bsc#1139101).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- macsec: fix checksumming after decryption (bsc#1051510).
- macsec: fix use-after-free of skb during RX (bsc#1051510).
- macsec: let the administrator set UP state even if lowerdev is down (bsc#1051510).
- macsec: update operstate when lower device changes (bsc#1051510).
- mailbox: handle failed named mailbox channel request (bsc#1051510).
- media: coda: fix last buffer handling in V4L2_ENC_CMD_STOP (bsc#1051510).
- media: coda: fix mpeg2 sequence number handling (bsc#1051510).
- media: coda: increment sequence offset for the last returned frame (bsc#1051510).
- media: coda: Remove unbalanced and unneeded mutex unlock (bsc#1051510).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: dvb: usb: fix use after free in dvb_usb_device_exit (bsc#1051510).
- media: hdpvr: fix locking and a missing msleep (bsc#1051510).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: media_device_enum_links32: clean a reserved field (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: spi: IR LED: add missing of table registration (bsc#1051510).
- media: staging: media: davinci_vpfe: - Fix for memory leak if decoder initialization fails (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- media: vpss: fix a potential NULL pointer dereference (bsc#1051510).
- media: wl128x: Fix some error handling in fm_v4l2_init_video_device() (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/9p: include trans_common.h to fix missing prototype warning (bsc#1051510).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: remove duplicate fetch in sock_getsockopt (networking-stable-19_07_02).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fixed new system time seconds value calculation (networking-stable-19_07_02).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: stmmac: set IC bit when transmitting frames with HW timestamp (networking-stable-19_07_02).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nfc: fix potential illegal memory access (bsc#1051510).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvme: fix possible use-after-free in connect error flow (bsc#1139500, bsc#1140426)
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- PCI: Always allow probing with driver_override (bsc#1051510).
- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).
- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix panic by calling hv_pci_remove_slots() earlier (bsc#1142701).
- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).
- PCI: hv: support reporting serial number as slot information (bsc#1142701).
- PCI: qcom: Ensure that PERST is asserted for at least 100 ms (bsc#1142635).
- PCI: Return error if cannot probe VF (bsc#1051510).
- PCI: xilinx-nwl: Fix Multi MSI data programming (bsc#1142635).
- pinctrl: pistachio: fix leaked of_node references (bsc#1051510).
- pinctrl: rockchip: fix leaked of_node references (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/kdump: Handle crashkernel memory reservation failure (bsc#1143466 LTC#179600).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hash/4k: Do not use 64K page size for vmemmap with 4K pagesize (bsc#1142685 LTC#179509).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm/radix: Use the right page size for vmemmap mapping (bsc#1055117 bsc#1142685 LTC#179509).
- powerpc/pseries: Fix xive=off command line (bsc#1085030, git-fixes).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (git-fixes).
- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).
- pwm: stm32: Use 3 cells ->of_xlate() (bsc#1111666).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len & size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- qmi_wwan: Fix out-of-bounds read (bsc#1111666).
- rbd: do not (ab)use obj_req->pages for stat requests (bsc#1141450).
- rbd: do not NULL out ->obj_request in rbd_img_obj_parent_read_full() (bsc#1141450).
- rbd: get rid of img_req->copyup_pages (bsc#1141450).
- rbd: move from raw pages to bvec data descriptors (bsc#1141450).
- rbd: remove bio cloning helpers (bsc#1141450).
- rbd: start enums at 1 instead of 0 (bsc#1141450).
- rbd: use kmem_cache_zalloc() in rbd_img_request_create() (bsc#1141450).
- RDS: IB: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- regmap: fix bulk writes on paged registers (bsc#1051510).
- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142117 bsc#1142118 bsc#1142119 LTC#179329 LTC#179330 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- sctp: change to hold sk after auth shkey is created successfully (networking-stable-19_07_02).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: 8250: Fix TX interrupt handling condition (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).
- sky2: Disable MSI on ASUS P6T (bsc#1142496).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tipc: change to use register_pernet_device (networking-stable-19_07_02).
- tracing: Fix header include guards in trace event headers (bsc#1144474).
- tty/ldsem, locking/rwsem: Add missing ACQUIRE to read_failed sleep loop (bsc#1051510).
- tty: max310x: Fix invalid baudrate divisors calculator (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty/serial: digicolor: Fix digicolor-usart already registered warning (bsc#1051510).
- tty: serial: msm_serial: avoid system lockup condition (bsc#1051510).
- tua6100: Avoid build warnings (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- tun: wake up waitqueues after IFF_UP is set (networking-stable-19_07_02).
- Update patches.arch/powerpc-pseries-Fix-xive-off-command-line.patch (bsc#1085030, bsc#1144518, LTC#178833).
- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).
- usb: core: hub: Disable hub-initiated U1/U2 (bsc#1051510).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: Handle USB3 remote wakeup for LPM enabled devices correctly (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- usb: wusbcore: fix unbalanced get/put cluster_id (bsc#1051510).
- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
Patchnames
openSUSE-2019-1924
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-1125: Fix Spectre V1 variant memory disclosure by speculation over the SWAPGS instruction (bsc#1139358).\n- CVE-2019-10207: A NULL pointer dereference was possible in the bluetooth stack, which could lead to crashes. (bnc#1123959 bnc#1142857).\n- CVE-2018-20855: In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bnc#1143045).\n- CVE-2019-14284: drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bnc#1143189).\n- CVE-2019-14283: set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bnc#1143191).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254 bnc#1142265).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bnc#1142023).\n\nThe following non-security bugs were fixed:\n\n- 9p: acl: fix uninitialized iattr access (bsc#1051510).\n- 9p: p9dirent_read: check network-provided name length (bsc#1051510).\n- 9p: pass the correct prototype to read_cache_page (bsc#1051510).\n- 9p/rdma: do not disconnect on down_interruptible EAGAIN (bsc#1051510).\n- 9p/rdma: remove useless check in cm_event_handler (bsc#1051510).\n- 9p/virtio: Add cleanup path in p9_virtio_init (bsc#1051510).\n- 9p/xen: Add cleanup path in p9_trans_xen_init (bsc#1051510).\n- 9p/xen: fix check for xenbus_read error in front_probe (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- acpi/arm64: ignore 5.1 FADTs that are reported as 5.0 (bsc#1051510).\n- acpi/IORT: Fix off-by-one check in iort_dev_find_its_id() (bsc#1051510).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi: PM: Fix regression in acpi_device_set_power() (bsc#1051510).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_key: fix leaks in key_pol_get_resp and dump_sp (bsc#1051510).\n- af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET (networking-stable-19_07_02).\n- af_unix: remove redundant lockdep class (git-fixes).\n- ALSA: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- ALSA: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- ALSA: compress: Fix regression on compressed capture streams (bsc#1051510).\n- ALSA: compress: Prevent bypasses of set_params (bsc#1051510).\n- ALSA: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- ALSA: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- ALSA: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- ALSA: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- ALSA: line6: Fix a typo (bsc#1051510).\n- ALSA: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- ALSA: pcm: fix lost wakeup event scenarios in snd_pcm_drain (bsc#1051510).\n- ALSA: seq: Break too long mutex context in the write loop (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- ALSA: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- ALSA: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- ALSA: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check (bsc#1051510).\n- ALSA: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- arm64: KVM: Fix architecturally invalid reset value for FPEXC32_EL2 (bsc#1133021).\n- ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1133021).\n- ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1 (bsc#1133021).\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ata: libahci: do not complain in case of deferred probe (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- Bluetooth: 6lowpan: search for destination address in all peers (bsc#1051510).\n- Bluetooth: Add SMP workaround Microsoft Surface Precision Mouse bug (bsc#1051510).\n- Bluetooth: Check state in l2cap_disconnect_rsp (bsc#1051510).\n- Bluetooth: hci_bcsp: Fix memory leak in rx_skb (bsc#1051510).\n- Bluetooth: validate BLE connection interval updates (bsc#1051510).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: Always enable vlan tx offload (networking-stable-19_07_02).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).\n- btrfs: scrub: add memalloc_nofs protection around init_ipath (bsc#1086103).\n- btrfs: use GFP_KERNEL in init_ipath (bsc#1086103).\n- ceph: fix iov_iter issues in ceph_direct_read_write() (bsc#1141450).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - fix skcipher failure due to wrong output IV (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#11123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- dma-buf: balance refcount inbalance (bsc#1051510).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- Documentation: Add nospectre_v1 parameter (bsc#1051510).\n- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- Documentation/networking: fix default_ttl typo in mpls-sysctl (bsc#1051510).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- driver core: Fix use-after-free and double free on glue directory (bsc#1131281).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/bridge: sii902x: pixel clock unit is 10kHz instead of 1kHz (bsc#1051510).\n- drm/bridge: tc358767: read display_props in get_modes() (bsc#1051510).\n- drm/crc-debugfs: User irqsafe spinlock in drm_crtc_add_crc_entry (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm: Depopulate platform on probe failure (bsc#1051510).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/panel: simple: Fix panel_simple_dsi_probe (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/virtio: Add memory barriers for capset cache (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- eCryptfs: fix a couple type promotion bugs (bsc#1051510).\n- EDAC: Fix global-out-of-bounds write when setting edac_mc_poll_msec (bsc#1114279).\n- efi/bgrt: Drop BGRT status field reserved bits check (bsc#1051510).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- firmware: ti_sci: Always request response from firmware (bsc#1051510).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- gpio: omap: ensure irq is enabled before wakeup (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- hpet: Fix division by zero in hpet_time_div() (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hwmon: (nct6775) Fix register address and added missed tolerance for nct6106 (bsc#1051510).\n- iio: iio-utils: Fix possible incorrect mask calculation (bsc#1051510).\n- Input: alps - do not handle ALPS cs19 trackpoint-only device (bsc#1051510).\n- Input: alps - fix a mismatch between a condition check and its comment (bsc#1051510).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - whitelist Lenovo T580 SMBus intertouch (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: trackpoint - only expose supported controls for Elan, ALPS and NXP (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- intel_th: pci: Add Ice Lake NNPI support (bsc#1051510).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Do not clear eventid when freeing an MSI (bsc#1051510).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- KVM: arm64: Fix caching of host MDCR_EL2 value (bsc#1133021).\n- KVM: arm/arm64: Close VMID generation race (bsc#1133021).\n- KVM: arm/arm64: Convert kvm_host_cpu_state to a static per-cpu allocation (bsc#1133021).\n- KVM: arm/arm64: Drop resource size check for GICV window (bsc#1133021).\n- KVM: arm/arm64: Fix lost IRQs from emulated physcial timer when blocked (bsc#1133021).\n- KVM: arm/arm64: Fix VMID alloc race by reverting to lock-less (bsc#1133021).\n- KVM: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1133021).\n- KVM: arm/arm64: Reduce verbosity of KVM init log (bsc#1133021).\n- KVM: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1133021).\n- KVM: arm/arm64: Skip updating PMD entry if no change (bsc#1133021).\n- KVM: arm/arm64: Skip updating PTE entry if no change (bsc#1133021).\n- KVM: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1133021).\n- KVM: arm/arm64: vgic: Fix kvm_device leak in vgic_its_destroy (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix potential overrun in vgic_copy_lpi_list (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1133021).\n- kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init (bsc#1133021).\n- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- KVM: mmu: Fix overlap between public and private memslots (bsc#1133021).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- KVM: polling: add architecture backend to disable polling (bsc#1119222).\n- KVM: Reject device ioctls from processes other than the VM\u0027s creator (bsc#1133021).\n- KVM: s390: change default halt poll time to 50us (bsc#1119222).\n- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- KVM: s390: fix typo in parameter description (bsc#1119222).\n- KVM: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- KVM: x86: fix return value for reserved EFER (bsc#1140992).\n- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- libata: do not request sense data on !ZAC ATA devices (bsc#1051510).\n- libata: zpodd: Fix small read overflow in zpodd_get_mech_type() (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- libceph: add osd_req_op_extent_osd_data_bvecs() (bsc#1141450).\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: handle zero-length data items (bsc#1141450).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce BVECS data type (bsc#1141450).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: new bio handling code (aka do not clone bios) (bsc#1141450).\n- libceph: use single request data item for cmp/setxattr (bsc#1139101).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- macsec: fix checksumming after decryption (bsc#1051510).\n- macsec: fix use-after-free of skb during RX (bsc#1051510).\n- macsec: let the administrator set UP state even if lowerdev is down (bsc#1051510).\n- macsec: update operstate when lower device changes (bsc#1051510).\n- mailbox: handle failed named mailbox channel request (bsc#1051510).\n- media: coda: fix last buffer handling in V4L2_ENC_CMD_STOP (bsc#1051510).\n- media: coda: fix mpeg2 sequence number handling (bsc#1051510).\n- media: coda: increment sequence offset for the last returned frame (bsc#1051510).\n- media: coda: Remove unbalanced and unneeded mutex unlock (bsc#1051510).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: dvb: usb: fix use after free in dvb_usb_device_exit (bsc#1051510).\n- media: hdpvr: fix locking and a missing msleep (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: media_device_enum_links32: clean a reserved field (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: spi: IR LED: add missing of table registration (bsc#1051510).\n- media: staging: media: davinci_vpfe: - Fix for memory leak if decoder initialization fails (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- media: vpss: fix a potential NULL pointer dereference (bsc#1051510).\n- media: wl128x: Fix some error handling in fm_v4l2_init_video_device() (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/9p: include trans_common.h to fix missing prototype warning (bsc#1051510).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: remove duplicate fetch in sock_getsockopt (networking-stable-19_07_02).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fixed new system time seconds value calculation (networking-stable-19_07_02).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: stmmac: set IC bit when transmitting frames with HW timestamp (networking-stable-19_07_02).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nfc: fix potential illegal memory access (bsc#1051510).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: fix possible use-after-free in connect error flow (bsc#1139500, bsc#1140426)\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix panic by calling hv_pci_remove_slots() earlier (bsc#1142701).\n- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).\n- PCI: hv: support reporting serial number as slot information (bsc#1142701).\n- PCI: qcom: Ensure that PERST is asserted for at least 100 ms (bsc#1142635).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: xilinx-nwl: Fix Multi MSI data programming (bsc#1142635).\n- pinctrl: pistachio: fix leaked of_node references (bsc#1051510).\n- pinctrl: rockchip: fix leaked of_node references (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/kdump: Handle crashkernel memory reservation failure (bsc#1143466 LTC#179600).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hash/4k: Do not use 64K page size for vmemmap with 4K pagesize (bsc#1142685 LTC#179509).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm/radix: Use the right page size for vmemmap mapping (bsc#1055117 bsc#1142685 LTC#179509).\n- powerpc/pseries: Fix xive=off command line (bsc#1085030, git-fixes).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qlge: Deduplicate lbq_buf_size (bsc#1106061).\n- qlge: Deduplicate rx buffer queue management (bsc#1106061).\n- qlge: Factor out duplicated expression (bsc#1106061).\n- qlge: Fix dma_sync_single calls (bsc#1106061).\n- qlge: Fix irq masking in INTx mode (bsc#1106061).\n- qlge: Refill empty buffer queues from wq (bsc#1106061).\n- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).\n- qlge: Remove bq_desc.maplen (bsc#1106061).\n- qlge: Remove irq_cnt (bsc#1106061).\n- qlge: Remove page_chunk.last_flag (bsc#1106061).\n- qlge: Remove qlge_bq.len \u0026 size (bsc#1106061).\n- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).\n- qlge: Remove rx_ring.type (bsc#1106061).\n- qlge: Remove useless dma synchronization calls (bsc#1106061).\n- qlge: Remove useless memset (bsc#1106061).\n- qlge: Replace memset with assignment (bsc#1106061).\n- qlge: Update buffer queue prod index despite oom (bsc#1106061).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- rbd: do not (ab)use obj_req-\u003epages for stat requests (bsc#1141450).\n- rbd: do not NULL out -\u003eobj_request in rbd_img_obj_parent_read_full() (bsc#1141450).\n- rbd: get rid of img_req-\u003ecopyup_pages (bsc#1141450).\n- rbd: move from raw pages to bvec data descriptors (bsc#1141450).\n- rbd: remove bio cloning helpers (bsc#1141450).\n- rbd: start enums at 1 instead of 0 (bsc#1141450).\n- rbd: use kmem_cache_zalloc() in rbd_img_request_create() (bsc#1141450).\n- RDS: IB: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regmap: fix bulk writes on paged registers (bsc#1051510).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142117 bsc#1142118 bsc#1142119 LTC#179329 LTC#179330 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- sctp: change to hold sk after auth shkey is created successfully (networking-stable-19_07_02).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: 8250: Fix TX interrupt handling condition (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Do not leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- sky2: Disable MSI on ASUS P6T (bsc#1142496).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tipc: change to use register_pernet_device (networking-stable-19_07_02).\n- tracing: Fix header include guards in trace event headers (bsc#1144474).\n- tty/ldsem, locking/rwsem: Add missing ACQUIRE to read_failed sleep loop (bsc#1051510).\n- tty: max310x: Fix invalid baudrate divisors calculator (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty/serial: digicolor: Fix digicolor-usart already registered warning (bsc#1051510).\n- tty: serial: msm_serial: avoid system lockup condition (bsc#1051510).\n- tua6100: Avoid build warnings (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- tun: wake up waitqueues after IFF_UP is set (networking-stable-19_07_02).\n- Update patches.arch/powerpc-pseries-Fix-xive-off-command-line.patch (bsc#1085030, bsc#1144518, LTC#178833).\n- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).\n- usb: core: hub: Disable hub-initiated U1/U2 (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: Handle USB3 remote wakeup for LPM enabled devices correctly (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- usb: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- usb: wusbcore: fix unbalanced get/put cluster_id (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1924", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1924-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1924-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1924-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1086103", "url": "https://bugzilla.suse.com/1086103" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1106061", "url": "https://bugzilla.suse.com/1106061" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123959", "url": "https://bugzilla.suse.com/1123959" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1131281", "url": "https://bugzilla.suse.com/1131281" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1139101", "url": "https://bugzilla.suse.com/1139101" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139500", "url": "https://bugzilla.suse.com/1139500" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140426", "url": "https://bugzilla.suse.com/1140426" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140887", "url": "https://bugzilla.suse.com/1140887" }, { "category": "self", "summary": "SUSE Bug 1140888", "url": "https://bugzilla.suse.com/1140888" }, { "category": "self", "summary": "SUSE Bug 1140889", "url": "https://bugzilla.suse.com/1140889" }, { "category": "self", "summary": "SUSE Bug 1140891", "url": "https://bugzilla.suse.com/1140891" }, { "category": "self", "summary": "SUSE Bug 1140893", "url": "https://bugzilla.suse.com/1140893" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1140954", "url": "https://bugzilla.suse.com/1140954" }, { "category": "self", "summary": "SUSE Bug 1140955", "url": "https://bugzilla.suse.com/1140955" }, { "category": "self", "summary": "SUSE Bug 1140956", "url": "https://bugzilla.suse.com/1140956" }, { "category": "self", "summary": "SUSE Bug 1140957", "url": "https://bugzilla.suse.com/1140957" }, { "category": "self", "summary": "SUSE Bug 1140958", "url": "https://bugzilla.suse.com/1140958" }, { "category": "self", "summary": "SUSE Bug 1140959", "url": "https://bugzilla.suse.com/1140959" }, { "category": "self", "summary": "SUSE Bug 1140960", "url": "https://bugzilla.suse.com/1140960" }, { "category": "self", "summary": "SUSE Bug 1140961", "url": "https://bugzilla.suse.com/1140961" }, { "category": "self", "summary": "SUSE Bug 1140962", "url": "https://bugzilla.suse.com/1140962" }, { "category": "self", "summary": "SUSE Bug 1140964", "url": "https://bugzilla.suse.com/1140964" }, { "category": "self", "summary": "SUSE Bug 1140971", "url": "https://bugzilla.suse.com/1140971" }, { "category": "self", "summary": "SUSE Bug 1140972", "url": "https://bugzilla.suse.com/1140972" }, { "category": "self", "summary": "SUSE Bug 1140992", "url": "https://bugzilla.suse.com/1140992" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141450", "url": "https://bugzilla.suse.com/1141450" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142117", "url": "https://bugzilla.suse.com/1142117" }, { "category": "self", "summary": "SUSE Bug 1142118", "url": "https://bugzilla.suse.com/1142118" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142496", "url": "https://bugzilla.suse.com/1142496" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142857", "url": "https://bugzilla.suse.com/1142857" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143466", "url": "https://bugzilla.suse.com/1143466" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE Bug 1144474", "url": "https://bugzilla.suse.com/1144474" }, { "category": "self", "summary": "SUSE Bug 1144518", "url": "https://bugzilla.suse.com/1144518" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-16T12:25:41Z", "generator": { "date": "2019-08-16T12:25:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1924-1", "initial_release_date": "2019-08-16T12:25:41Z", "revision_history": [ { "date": "2019-08-16T12:25:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp150.12.70.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp150.12.70.1.noarch", "product_id": "kernel-devel-4.12.14-lp150.12.70.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp150.12.70.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp150.12.70.1.noarch", "product_id": "kernel-docs-4.12.14-lp150.12.70.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp150.12.70.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp150.12.70.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp150.12.70.1.noarch", "product_id": "kernel-macros-4.12.14-lp150.12.70.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp150.12.70.1.noarch", "product": { "name": "kernel-source-4.12.14-lp150.12.70.1.noarch", "product_id": "kernel-source-4.12.14-lp150.12.70.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-debug-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-default-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-syms-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp150.12.70.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp150.12.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp150.12.70.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp150.12.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp150.12.70.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp150.12.70.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp150.12.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp150.12.70.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp150.12.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.70.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.70.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:25:41Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
opensuse-su-2019:1923-1
Vulnerability from csaf_opensuse
Published
2019-08-16 12:21
Modified
2019-08-16 12:21
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-1125: Fix Spectre V1 variant memory disclosure by speculation over the SWAPGS instruction (bsc#1139358).
- CVE-2019-10207: A NULL pointer dereference was possible in the bluetooth stack, which could lead to crashes. (bnc#1123959 bnc#1142857).
- CVE-2018-20855: In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bnc#1143045).
- CVE-2019-14284: drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. (bnc#1143189).
- CVE-2019-14283: set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. (bnc#1143191).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bnc#1134399).
- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254 bnc#1142265).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bnc#1142023).
The following non-security bugs were fixed:
- 9p: acl: fix uninitialized iattr access (bsc#1051510).
- 9p: p9dirent_read: check network-provided name length (bsc#1051510).
- 9p: pass the correct prototype to read_cache_page (bsc#1051510).
- 9p/rdma: do not disconnect on down_interruptible EAGAIN (bsc#1051510).
- 9p/rdma: remove useless check in cm_event_handler (bsc#1051510).
- 9p/virtio: Add cleanup path in p9_virtio_init (bsc#1051510).
- 9p/xen: Add cleanup path in p9_trans_xen_init (bsc#1051510).
- 9p/xen: fix check for xenbus_read error in front_probe (bsc#1051510).
- acpi/arm64: ignore 5.1 FADTs that are reported as 5.0 (bsc#1051510).
- ACPI/IORT: Fix off-by-one check in iort_dev_find_its_id() (bsc#1051510).
- acpi/nfit: Always dump _DSM output payload (bsc#1142351).
- ACPI: PM: Fix regression in acpi_device_set_power() (bsc#1051510).
- Add back sibling paca poiter to paca (bsc#1055117).
- Add support for crct10dif-vpmsum ().
- af_key: fix leaks in key_pol_get_resp and dump_sp (bsc#1051510).
- af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET (networking-stable-19_07_02).
- af_unix: remove redundant lockdep class (git-fixes).
- ALSA: compress: Be more restrictive about when a drain is allowed (bsc#1051510).
- ALSA: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).
- ALSA: compress: Fix regression on compressed capture streams (bsc#1051510).
- ALSA: compress: Prevent bypasses of set_params (bsc#1051510).
- ALSA: hda - Add a conexant codec entry to let mute led work (bsc#1051510).
- ALSA: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).
- ALSA: hda: Fix 1-minute detection delay when i915 module is not available (bsc#1111666).
- ALSA: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).
- ALSA: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).
- ALSA: hda/hdmi - Remove duplicated define (bsc#1111666).
- ALSA: hda - Optimize resume for codecs without jack detection (bsc#1111666).
- ALSA: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).
- ALSA: hda/realtek - Fixed Headphone Mic can't record on Dell platform (bsc#1051510).
- ALSA: hda/realtek - Headphone Mic can't record after S3 (bsc#1051510).
- ALSA: line6: Fix a typo (bsc#1051510).
- ALSA: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).
- ALSA: pcm: fix lost wakeup event scenarios in snd_pcm_drain (bsc#1051510).
- ALSA: seq: Break too long mutex context in the write loop (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).
- ALSA: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).
- ALSA: usb-audio: Cleanup DSD whitelist (bsc#1051510).
- ALSA: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).
- ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check (bsc#1051510).
- ALSA: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).
- ALSA: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).
- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- arm64: kvm: Fix architecturally invalid reset value for FPEXC32_EL2 (bsc#1133021).
- ARM: kvm: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1133021).
- ARM: kvm: report support for SMCCC_ARCH_WORKAROUND_1 (bsc#1133021).
- ASoC : cs4265 : readable register too low (bsc#1051510).
- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).
- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).
- ath10k: add missing error handling (bsc#1111666).
- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).
- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).
- ath10k: Do not send probe response template for mesh (bsc#1111666).
- ath10k: Fix encoding for protected management frames (bsc#1111666).
- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).
- ath10k: fix PCIE device wake up failed (bsc#1111666).
- ath6kl: add some bounds checking (bsc#1051510).
- ath9k: Check for errors when reading SREV register (bsc#1111666).
- ath9k: correctly handle short radar pulses (bsc#1111666).
- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).
- batman-adv: fix for leaked TVLV handler (bsc#1051510).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: add code comments for journal_read_bucket() (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for kobj release callback routine (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add comments for mutex_lock(&b->write_lock) (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add error check for calling register_bdev() (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid clang -Wunintialized warning (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: check c->gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: Clean up bch_get_congested() (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: destroy dc->writeback_write_wq if failed to create dc->writeback_thread (bsc#1140652).
- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: do not set max writeback rate if gc is running (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix failure in journal relplay (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix inaccurate result of unused buckets (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix race in btree_flush_write() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix return value error in bch_journal_read() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: ignore read-ahead request failure on backing device (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve bcache_reboot() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make bset_search_tree() be more understandable (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: make is_discard_enabled() static (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: more detailed error message to bcache_device_link() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: move definition of 'int ret' out of macro read_bucket() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: performance improvement for btree_flush_write() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: remove 'XXX:' comment line from run_cache_set() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: return error immediately in bch_journal_replay() (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: set largest seq to ja->seq[bucket_index] in journal_read_bucket() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).
- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).
- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).
- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).
- block, bfq: NULL out the bic when it's no longer valid (bsc#1142359).
- Bluetooth: 6lowpan: search for destination address in all peers (bsc#1051510).
- Bluetooth: Add SMP workaround Microsoft Surface Precision Mouse bug (bsc#1051510).
- Bluetooth: Check state in l2cap_disconnect_rsp (bsc#1051510).
- Bluetooth: hci_bcsp: Fix memory leak in rx_skb (bsc#1051510).
- Bluetooth: validate BLE connection interval updates (bsc#1051510).
- bnx2fc_fcoe: Use skb_queue_walk_safe() (bsc#1136502 jsc#SLE-4703).
- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).
- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).
- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).
- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).
- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).
- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).
- bonding: Always enable vlan tx offload (networking-stable-19_07_02).
- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).
- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).
- bpf: fix callees pruning callers (bsc#1109837).
- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).
- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).
- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).
- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).
- btrfs: fix race between block group removal and block group allocation (bsc#1143003).
- btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).
- btrfs: scrub: add memalloc_nofs protection around init_ipath (bsc#1086103).
- btrfs: use GFP_KERNEL in init_ipath (bsc#1086103).
- carl9170: fix misuse of device driver API (bsc#1111666).
- ceph: fix iov_iter issues in ceph_direct_read_write() (bsc#1141450). blacklist.conf: dropped patch from blacklist.
- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).
- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).
- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).
- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).
- Correct iwlwifi 22000 series ucode file name (bsc#1142673)
- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)
- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).
- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).
- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).
- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).
- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).
- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).
- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).
- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).
- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).
- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).
- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).
- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).
- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).
- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).
- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).
- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).
- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).
- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).
- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).
- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).
- crypto: talitos - fix CTR alg blocksize (bsc#1051510).
- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).
- crypto: talitos - fix skcipher failure due to wrong output IV (bsc#1051510).
- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).
- crypto: talitos - properly handle split ICV (bsc#1051510).
- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).
- crypto: talitos - rename alternative AEAD algos (bsc#1051510).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#11123080).
- dma-buf: balance refcount inbalance (bsc#1051510).
- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).
- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dmaengine: hsu: Revert 'set HSU_CH_MTSR to memory width' (bsc#1051510).
- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).
- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).
- Documentation: Add nospectre_v1 parameter (bsc#1051510).
- Documentation/networking: fix default_ttl typo in mpls-sysctl (bsc#1051510).
- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).
- driver core: Fix use-after-free and double free on glue directory (bsc#1131281).
- drm/amd/display: Always allocate initial connector state state (bsc#1111666).
- drm/amd/display: Disable ABM before destroy ABM struct (bsc#1111666).
- drm/amd/display: Fill prescale_params->scale for RGB565 (bsc#1111666).
- drm/amd/display: fix compilation error (bsc#1111666).
- drm/amd/display: Make some functions static (bsc#1111666).
- drm/amdgpu/sriov: Need to initialize the HDP_NONSURFACE_BAStE (bsc#1111666).
- drm/amdkfd: Fix a potential memory leak (bsc#1111666).
- drm/amdkfd: Fix sdma queue map issue (bsc#1111666).
- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).
- drm/bridge: sii902x: pixel clock unit is 10kHz instead of 1kHz (bsc#1051510).
- drm/bridge: tc358767: read display_props in get_modes() (bsc#1051510).
- drm/crc-debugfs: User irqsafe spinlock in drm_crtc_add_crc_entry (bsc#1051510).
- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).
- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).
- drm/meson: Add support for XBGR8888 & ABGR8888 formats (bsc#1051510).
- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).
- drm/msm: Depopulate platform on probe failure (bsc#1051510).
- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).
- drm/nouveau/i2c: Enable i2c pads & busses during preinit (bsc#1051510).
- drm/panel: simple: Fix panel_simple_dsi_probe (bsc#1051510).
- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).
- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).
- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).
- drm/udl: move to embedding drm device inside udl device (bsc#1111666).
- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).
- drm/vc4: fix fb references in async update (bsc#1141312).
- drm/virtio: Add memory barriers for capset cache (bsc#1051510).
- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).
- e1000e: start network tx queue only when link is up (bsc#1051510).
- eCryptfs: fix a couple type promotion bugs (bsc#1051510).
- EDAC: Fix global-out-of-bounds write when setting edac_mc_poll_msec (bsc#1114279).
- efi/bgrt: Drop BGRT status field reserved bits check (bsc#1051510).
- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)
- ethtool: check the return value of get_regs_len (git-fixes).
- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).
- firmware: ti_sci: Always request response from firmware (bsc#1051510).
- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).
- Fix memory leak in sctp_process_init (networking-stable-19_06_09).
- floppy: fix invalid pointer dereference in drive_name (bsc#1111666).
- floppy: fix out-of-bounds read in next_valid_format (bsc#1111666).
- fork, memcg: fix cached_stacks case (bsc#1134097).
- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).
- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).
- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).
- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).
- gpio: omap: ensure irq is enabled before wakeup (bsc#1051510).
- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).
- HID: wacom: correct touch resolution x/y typo (bsc#1051510).
- HID: wacom: generic: Correct pad syncing (bsc#1051510).
- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).
- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).
- hpet: Fix division by zero in hpet_time_div() (bsc#1051510).
- hv_netvsc-Set-probe-mode-to-sync.patch: (bsc#1142083).
- hwmon: (nct6775) Fix register address and added missed tolerance for nct6106 (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992).
- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).
- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).
- iio: iio-utils: Fix possible incorrect mask calculation (bsc#1051510).
- Input: alps - do not handle ALPS cs19 trackpoint-only device (bsc#1051510).
- Input: alps - fix a mismatch between a condition check and its comment (bsc#1051510).
- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).
- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).
- Input: psmouse - fix build error of multiple definition (bsc#1051510).
- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).
- Input: synaptics - whitelist Lenovo T580 SMBus intertouch (bsc#1051510).
- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).
- Input: trackpoint - only expose supported controls for Elan, ALPS and NXP (bsc#1051510).
- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).
- intel_th: pci: Add Ice Lake NNPI support (bsc#1051510).
- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).
- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).
- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).
- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).
- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).
- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).
- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).
- ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 (networking-stable-19_06_09).
- iwlwifi: correct one of the PCI struct names (bsc#1111666).
- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).
- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).
- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).
- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).
- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).
- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).
- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).
- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).
- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).
- kABI: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- kABI: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- KABI: remove unused hcall definition (bsc#1140322 LTC#176270).
- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).
- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 LTC#178058 LTC#178059).
- kvm: arm64: Fix caching of host MDCR_EL2 value (bsc#1133021).
- kvm: arm/arm64: Close VMID generation race (bsc#1133021).
- kvm: arm/arm64: Convert kvm_host_cpu_state to a static per-cpu allocation (bsc#1133021).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1133021).
- kvm: arm/arm64: Fix lost IRQs from emulated physcial timer when blocked (bsc#1133021).
- kvm: arm/arm64: Fix VMID alloc race by reverting to lock-less (bsc#1133021).
- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1133021).
- kvm: arm/arm64: Reduce verbosity of KVM init log (bsc#1133021).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1133021).
- kvm: arm/arm64: Skip updating PMD entry if no change (bsc#1133021).
- kvm: arm/arm64: Skip updating PTE entry if no change (bsc#1133021).
- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1133021).
- kvm: arm/arm64: vgic: Fix kvm_device leak in vgic_its_destroy (bsc#1133021).
- kvm: arm/arm64: vgic-its: Fix potential overrun in vgic_copy_lpi_list (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).
- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).
- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1133021).
- kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init (bsc#1133021).
- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bsc#1133021).
- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
- kvm: mmu: Fix overlap between public and private memslots (bsc#1133021).
- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).
- kvm: polling: add architecture backend to disable polling (bsc#1119222).
- kvm: Reject device ioctls from processes other than the VM's creator (bsc#1133021).
- kvm: s390: change default halt poll time to 50us (bsc#1119222).
- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222
- kvm: s390: fix typo in parameter description (bsc#1119222).
- kvm: s390: kABI Workaround for 'lowcore' (bsc#1119222).
- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).
- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).
- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).
- lapb: fixed leak of control-blocks (networking-stable-19_06_18).
- libata: do not request sense data on !ZAC ATA devices (bsc#1051510).
- libata: zpodd: Fix small read overflow in zpodd_get_mech_type() (bsc#1051510).
- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).
- libceph: add osd_req_op_extent_osd_data_bvecs() (bsc#1141450).
- libceph: assign cookies in linger_submit() (bsc#1135897).
- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).
- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).
- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).
- libceph: handle zero-length data items (bsc#1141450).
- libceph: introduce alloc_watch_request() (bsc#1135897).
- libceph: introduce BVECS data type (bsc#1141450).
- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).
- libceph: preallocate message data items (bsc#1135897).
- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).
- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).
- libceph, rbd: new bio handling code (aka do not clone bios) (bsc#1141450).
- libceph: use single request data item for cmp/setxattr (bsc#1139101).
- lib: fix stall in __bitmap_parselist() (bsc#1051510).
- libnvdimm/namespace: Fix label tracking error (bsc#1142350).
- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).
- lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE (bsc#1051510).
- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).
- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).
- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).
- mac80211: do not start any work during reconfigure flow (bsc#1111666).
- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).
- mac80211: free peer keys before vif down in mesh (bsc#1111666).
- mac80211: mesh: fix RCU warning (bsc#1111666).
- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).
- macsec: fix checksumming after decryption (bsc#1051510).
- macsec: fix use-after-free of skb during RX (bsc#1051510).
- macsec: let the administrator set UP state even if lowerdev is down (bsc#1051510).
- macsec: update operstate when lower device changes (bsc#1051510).
- mailbox: handle failed named mailbox channel request (bsc#1051510).
- media: coda: fix last buffer handling in V4L2_ENC_CMD_STOP (bsc#1051510).
- media: coda: fix mpeg2 sequence number handling (bsc#1051510).
- media: coda: increment sequence offset for the last returned frame (bsc#1051510).
- media: coda: Remove unbalanced and unneeded mutex unlock (bsc#1051510).
- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).
- media: dvb: usb: fix use after free in dvb_usb_device_exit (bsc#1051510).
- media: hdpvr: fix locking and a missing msleep (bsc#1051510).
- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).
- media: media_device_enum_links32: clean a reserved field (bsc#1051510).
- media: s5p-mfc: Make additional clocks optional (bsc#1051510).
- media: spi: IR LED: add missing of table registration (bsc#1051510).
- media: staging: media: davinci_vpfe: - Fix for memory leak if decoder initialization fails (bsc#1051510).
- media: v4l2: Test type instead of cfg->type in v4l2_ctrl_new_custom() (bsc#1051510).
- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).
- media: vpss: fix a potential NULL pointer dereference (bsc#1051510).
- media: wl128x: Fix some error handling in fm_v4l2_init_video_device() (bsc#1051510).
- mei: bus: need to unlink client before freeing (bsc#1051510).
- mei: me: add denverton innovation engine device IDs (bsc#1051510).
- mei: me: add gemini lake devices id (bsc#1051510).
- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).
- memstick: Fix error cleanup path of memstick_init (bsc#1051510).
- mfd: intel-lpss: Release IDA resources (bsc#1051510).
- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).
- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).
- mmc: sdhci-pci: Try 'cd' for card-detect lookup before using NULL (bsc#1051510).
- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).
- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).
- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).
- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).
- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).
- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).
- net/9p: include trans_common.h to fix missing prototype warning (bsc#1051510).
- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).
- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).
- net: avoid weird emergency message (networking-stable-19_05_21).
- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).
- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).
- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).
- net: hns3: Fix inconsistent indenting (bsc#1140676).
- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).
- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).
- net: hns: Fix loopback test failed at copper ports (bsc#1140676).
- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).
- net: hns: fix unsigned comparison to less than zero (bsc#1140676).
- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).
- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).
- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).
- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).
- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).
- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).
- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).
- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).
- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).
- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).
- net/packet: fix memory leak in packet_set_ring() (git-fixes).
- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).
- net: remove duplicate fetch in sock_getsockopt (networking-stable-19_07_02).
- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).
- net: stmmac: fixed new system time seconds value calculation (networking-stable-19_07_02).
- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).
- net: stmmac: set IC bit when transmitting frames with HW timestamp (networking-stable-19_07_02).
- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).
- net/tls: make sure offload also gets the keys wiped (bsc#1109837).
- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).
- nfc: fix potential illegal memory access (bsc#1051510).
- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).
- nvme: fix possible use-after-free in connect error flow (bsc#1139500)
- nvme: fix possible use-after-free in connect error flow (bsc#1139500, bsc#1140426)
- ocfs2: add first lock wait time in locking_state (bsc#1134390).
- ocfs2: add last unlock times in locking_state (bsc#1134390).
- ocfs2: add locking filter debugfs file (bsc#1134390).
- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).
- packet: Fix error path in packet_init (networking-stable-19_05_14).
- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).
- PCI/AER: Use cached AER Capability offset (bsc#1142623).
- PCI: Always allow probing with driver_override (bsc#1051510).
- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).
- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).
- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).
- PCI: hv: Fix panic by calling hv_pci_remove_slots() earlier (bsc#1142701).
- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).
- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).
- PCI: hv: support reporting serial number as slot information (bsc#1142701).
- PCI/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).
- PCI / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).
- PCI/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).
- PCI/portdrv: Consolidate comments (bsc#1142623).
- PCI/portdrv: Disable port driver in compat mode (bsc#1142623).
- PCI/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).
- PCI: portdrv: Restore PCI config state on slot reset (bsc#1142623).
- PCI/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).
- PCI/portdrv: Use conventional Device ID table formatting (bsc#1142623).
- PCI: qcom: Ensure that PERST is asserted for at least 100 ms (bsc#1142635).
- PCI: Return error if cannot probe VF (bsc#1051510).
- PCI: xilinx-nwl: Fix Multi MSI data programming (bsc#1142635).
- pinctrl: pistachio: fix leaked of_node references (bsc#1051510).
- pinctrl: rockchip: fix leaked of_node references (bsc#1051510).
- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).
- pktgen: do not sleep with the thread lock held (git-fixes).
- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).
- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).
- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).
- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).
- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).
- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).
- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).
- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).
- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).
- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().
- powerpc/kdump: Handle crashkernel memory reservation failure (bsc#1143466 LTC#179600).
- powerpc/mm: Change function prototype (bsc#1055117).
- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).
- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).
- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).
- powerpc/mm/hash/4k: Do not use 64K page size for vmemmap with 4K pagesize (bsc#1142685 LTC#179509).
- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).
- powerpc/mm/nvdimm: Add an informative message if we fail to allocate altmap block (bsc#1142685 LTC#179509).
- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).
- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).
- powerpc/mm/radix: Use the right page size for vmemmap mapping (bsc#1055117 bsc#1142685 LTC#179509).
- powerpc/nvdimm: Add support for multibyte read/write for metadata (bsc#1142685 LTC#179509).
- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).
- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).
- powerpc/pseries: Fix xive=off command line (bsc#1085030, git-fixes).
- powerpc/pseries/scm: Mark the region volatile if cache flush not required (bsc#1142685 LTC#179509).
- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).
- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).
- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).
- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- qlge: Deduplicate lbq_buf_size (bsc#1106061).
- qlge: Deduplicate rx buffer queue management (bsc#1106061).
- qlge: Factor out duplicated expression (bsc#1106061).
- qlge: Fix dma_sync_single calls (bsc#1106061).
- qlge: Fix irq masking in INTx mode (bsc#1106061).
- qlge: Refill empty buffer queues from wq (bsc#1106061).
- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
- qlge: Remove bq_desc.maplen (bsc#1106061).
- qlge: Remove irq_cnt (bsc#1106061).
- qlge: Remove page_chunk.last_flag (bsc#1106061).
- qlge: Remove qlge_bq.len & size (bsc#1106061).
- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
- qlge: Remove rx_ring.type (bsc#1106061).
- qlge: Remove useless dma synchronization calls (bsc#1106061).
- qlge: Remove useless memset (bsc#1106061).
- qlge: Replace memset with assignment (bsc#1106061).
- qlge: Update buffer queue prod index despite oom (bsc#1106061).
- rbd: do not (ab)use obj_req->pages for stat requests (bsc#1141450).
- rbd: do not NULL out ->obj_request in rbd_img_obj_parent_read_full() (bsc#1141450).
- rbd: get rid of img_req->copyup_pages (bsc#1141450).
- rbd: move from raw pages to bvec data descriptors (bsc#1141450).
- rbd: remove bio cloning helpers (bsc#1141450).
- rbd: start enums at 1 instead of 0 (bsc#1141450).
- rbd: use kmem_cache_zalloc() in rbd_img_request_create() (bsc#1141450).
- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).
- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992).
- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 ).
- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).
- RDS: IB: fix 'passing zero to ERR_PTR()' warning (git-fixes).
- Refresh patches.drivers/0001-PCI-pciehp-Unify-controller-and-slot-structs.patch. (bsc#1141558)
- regmap: fix bulk writes on paged registers (bsc#1051510).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()' (bsc#1140652).
- Revert 'e1000e: fix cyclic resets at link up with active tx' (bsc#1051510).
- Revert 'livepatch: Remove reliable stacktrace check in klp_try_switch_task()' (bsc#1071995).
- Revert 'serial: 8250: Do not service RX FIFO if interrupts are disabled' (bsc#1051510).
- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).
- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).
- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).
- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).
- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).
- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).
- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).
- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).
- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).
- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).
- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).
- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).
- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).
- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).
- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).
- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).
- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142117 bsc#1142118 bsc#1142119 LTC#179329 LTC#179330 LTC#179331).
- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).
- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).
- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).
- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).
- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).
- s390/vtime: steal time exponential moving average (bsc#1119222).
- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).
- scsi: bnx2fc: Fix error handling in probe() (bsc#1136502 jsc#SLE-4703).
- scsi: bnx2fc: fix incorrect cast to u64 on shift operation (bsc#1136502 jsc#SLE-4703).
- scsi: bnx2fc: Fix NULL dereference in error handling (bsc#1136502 jsc#SLE-4703).
- scsi: bnx2fc: Remove set but not used variable 'oxid' (bsc#1136502 jsc#SLE-4703).
- scsi: bnx2fc: remove unneeded variable (bsc#1136502 jsc#SLE-4703).
- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).
- SCSI: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).
- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst->atid (jsc#SLE-4678 bsc#1136342).
- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).
- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).
- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).
- scsi: libcxgbi: find cxgbi device by MAC address (bsc#1136352 jsc#SLE-4687).
- scsi: libcxgbi: remove uninitialized variable len (bsc#1136352 jsc#SLE-4687).
- scsi: libcxgbi: update route finding logic (bsc#1136352 jsc#SLE-4687)
- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Prevent 'use after free' memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set but not used variable 'phys_id' (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).
- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).
- scsi: mpt3sas: Determine smp affinity on per HBA basis (bsc#1143738).
- scsi: mpt3sas: Fix msix load balance on and off settings (bsc#1143738).
- scsi: mpt3sas: make driver options visible in sys (bsc#1143738).
- scsi: mpt3sas: Mark expected switch fall-through (bsc#1143738).
- scsi: mpt3sas: Remove CPU arch check to determine perf_mode (bsc#1143738).
- scsi: mpt3sas: Use 63-bit DMA addressing on SAS35 HBA (bsc#1143738).
- scsi: mpt3sas: Use configured PCIe link speed, not max (bsc#1143738).
- scsi: mpt3sas: use DEVICE_ATTR_{RO, RW} (bsc#1143738).
- scsi: qedf: Add additional checks for io_req->sc_cmd validity (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add driver state to 'driver_stats' debugfs node (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Remove set but not used variable 'fr_len' (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).
- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).
- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).
- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).
- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).
- sctp: change to hold sk after auth shkey is created successfully (networking-stable-19_07_02).
- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).
- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).
- serial: 8250: Fix TX interrupt handling condition (bsc#1051510).
- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).
- serial: uartps: Fix long line over 80 chars (bsc#1051510).
- serial: uartps: Fix multiple line dereference (bsc#1051510).
- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).
- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).
- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).
- staging: rtl8712: reduce stack usage, again (bsc#1051510).
- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).
- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).
- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).
- team: Always enable vlan tx offload (bsc#1051510).
- tipc: change to use register_pernet_device (networking-stable-19_07_02).
- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).
- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).
- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).
- tracing: Fix header include guards in trace event headers (bsc#1144474).
- tty/ldsem, locking/rwsem: Add missing ACQUIRE to read_failed sleep loop (bsc#1051510).
- tty: max310x: Fix invalid baudrate divisors calculator (bsc#1051510).
- tty: rocket: fix incorrect forward declaration of 'rp_init()' (bsc#1051510).
- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).
- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).
- tty/serial: digicolor: Fix digicolor-usart already registered warning (bsc#1051510).
- tty: serial: msm_serial: avoid system lockup condition (bsc#1051510).
- tua6100: Avoid build warnings (bsc#1051510).
- tuntap: synchronize through tfiles array instead of tun->numqueues (networking-stable-19_05_14).
- tun: wake up waitqueues after IFF_UP is set (networking-stable-19_07_02).
- Update patches.arch/powerpc-pseries-Fix-xive-off-command-line.patch (bsc#1085030, bsc#1144518, LTC#178833).
- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).
- usb: core: hub: Disable hub-initiated U1/U2 (bsc#1051510).
- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] (bsc#1051510).
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).
- usb: Handle USB3 remote wakeup for LPM enabled devices correctly (bsc#1051510).
- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).
- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).
- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).
- usb: wusbcore: fix unbalanced get/put cluster_id (bsc#1051510).
- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).
- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).
- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).
- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).
- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).
- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).
- wil6210: drop old event after wmi_call timeout (bsc#1111666).
- wil6210: fix potential out-of-bounds read (bsc#1051510).
- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xdp: fix possible cq entry leak (bsc#1109837).
- xdp: fix race on generic receive path (bsc#1109837).
- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).
- xfs: do not overflow xattr listent buffer (bsc#1143105).
- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).
- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).
Patchnames
openSUSE-2019-1923
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-1125: Fix Spectre V1 variant memory disclosure by speculation over the SWAPGS instruction (bsc#1139358).\n- CVE-2019-10207: A NULL pointer dereference was possible in the bluetooth stack, which could lead to crashes. (bnc#1123959 bnc#1142857).\n- CVE-2018-20855: In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bnc#1143045).\n- CVE-2019-14284: drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. (bnc#1143189).\n- CVE-2019-14283: set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. (bnc#1143191).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254 bnc#1142265).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bnc#1142023).\n\nThe following non-security bugs were fixed:\n\n- 9p: acl: fix uninitialized iattr access (bsc#1051510).\n- 9p: p9dirent_read: check network-provided name length (bsc#1051510).\n- 9p: pass the correct prototype to read_cache_page (bsc#1051510).\n- 9p/rdma: do not disconnect on down_interruptible EAGAIN (bsc#1051510).\n- 9p/rdma: remove useless check in cm_event_handler (bsc#1051510).\n- 9p/virtio: Add cleanup path in p9_virtio_init (bsc#1051510).\n- 9p/xen: Add cleanup path in p9_trans_xen_init (bsc#1051510).\n- 9p/xen: fix check for xenbus_read error in front_probe (bsc#1051510).\n- acpi/arm64: ignore 5.1 FADTs that are reported as 5.0 (bsc#1051510).\n- ACPI/IORT: Fix off-by-one check in iort_dev_find_its_id() (bsc#1051510).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- ACPI: PM: Fix regression in acpi_device_set_power() (bsc#1051510).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Add support for crct10dif-vpmsum ().\n- af_key: fix leaks in key_pol_get_resp and dump_sp (bsc#1051510).\n- af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET (networking-stable-19_07_02).\n- af_unix: remove redundant lockdep class (git-fixes).\n- ALSA: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- ALSA: compress: Do not allow paritial drain operations on capture streams (bsc#1051510).\n- ALSA: compress: Fix regression on compressed capture streams (bsc#1051510).\n- ALSA: compress: Prevent bypasses of set_params (bsc#1051510).\n- ALSA: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- ALSA: hda - Do not resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- ALSA: hda: Fix 1-minute detection delay when i915 module is not available (bsc#1111666).\n- ALSA: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- ALSA: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- ALSA: hda/hdmi - Remove duplicated define (bsc#1111666).\n- ALSA: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- ALSA: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- ALSA: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- ALSA: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- ALSA: line6: Fix a typo (bsc#1051510).\n- ALSA: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- ALSA: pcm: fix lost wakeup event scenarios in snd_pcm_drain (bsc#1051510).\n- ALSA: seq: Break too long mutex context in the write loop (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- ALSA: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- ALSA: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- ALSA: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check (bsc#1051510).\n- ALSA: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- ALSA: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- arm64: kvm: Fix architecturally invalid reset value for FPEXC32_EL2 (bsc#1133021).\n- ARM: kvm: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1133021).\n- ARM: kvm: report support for SMCCC_ARCH_WORKAROUND_1 (bsc#1133021).\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- Bluetooth: 6lowpan: search for destination address in all peers (bsc#1051510).\n- Bluetooth: Add SMP workaround Microsoft Surface Precision Mouse bug (bsc#1051510).\n- Bluetooth: Check state in l2cap_disconnect_rsp (bsc#1051510).\n- Bluetooth: hci_bcsp: Fix memory leak in rx_skb (bsc#1051510).\n- Bluetooth: validate BLE connection interval updates (bsc#1051510).\n- bnx2fc_fcoe: Use skb_queue_walk_safe() (bsc#1136502 jsc#SLE-4703).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Cap the returned MSIX vectors to the RDMA driver (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745).\n- bonding: Always enable vlan tx offload (networking-stable-19_07_02).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).\n- btrfs: scrub: add memalloc_nofs protection around init_ipath (bsc#1086103).\n- btrfs: use GFP_KERNEL in init_ipath (bsc#1086103).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- ceph: fix iov_iter issues in ceph_direct_read_write() (bsc#1141450). blacklist.conf: dropped patch from blacklist.\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Do not yell about bad mmc phases when getting (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673) \n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- cpufreq: acpi-cpufreq: Report if CPU does not support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - fix skcipher failure due to wrong output IV (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#11123080).\n- dma-buf: balance refcount inbalance (bsc#1051510).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- Documentation: Add nospectre_v1 parameter (bsc#1051510).\n- Documentation/networking: fix default_ttl typo in mpls-sysctl (bsc#1051510).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- driver core: Fix use-after-free and double free on glue directory (bsc#1131281).\n- drm/amd/display: Always allocate initial connector state state (bsc#1111666).\n- drm/amd/display: Disable ABM before destroy ABM struct (bsc#1111666).\n- drm/amd/display: Fill prescale_params-\u003escale for RGB565 (bsc#1111666).\n- drm/amd/display: fix compilation error (bsc#1111666).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/amdgpu/sriov: Need to initialize the HDP_NONSURFACE_BAStE (bsc#1111666).\n- drm/amdkfd: Fix a potential memory leak (bsc#1111666).\n- drm/amdkfd: Fix sdma queue map issue (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/bridge: sii902x: pixel clock unit is 10kHz instead of 1kHz (bsc#1051510).\n- drm/bridge: tc358767: read display_props in get_modes() (bsc#1051510).\n- drm/crc-debugfs: User irqsafe spinlock in drm_crtc_add_crc_entry (bsc#1051510).\n- drm/i915/cml: Introduce Comet Lake PCH (jsc#SLE-6681).\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm: Depopulate platform on probe failure (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/panel: simple: Fix panel_simple_dsi_probe (bsc#1051510).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/virtio: Add memory barriers for capset cache (bsc#1051510).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- eCryptfs: fix a couple type promotion bugs (bsc#1051510).\n- EDAC: Fix global-out-of-bounds write when setting edac_mc_poll_msec (bsc#1114279).\n- efi/bgrt: Drop BGRT status field reserved bits check (bsc#1051510).\n- Enable intel-speed-select driver and update supported.conf (jsc#SLE-5364)\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- firmware: ti_sci: Always request response from firmware (bsc#1051510).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- floppy: fix invalid pointer dereference in drive_name (bsc#1111666).\n- floppy: fix out-of-bounds read in next_valid_format (bsc#1111666).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fpga: add intel stratix10 soc fpga manager driver (jsc#SLE-7057).\n- fpga: stratix10-soc: fix use-after-free on s10_init() (jsc#SLE-7057).\n- fpga: stratix10-soc: fix wrong of_node_put() in init function (jsc#jsc#SLE-7057).\n- gpio: omap: ensure irq is enabled before wakeup (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- hpet: Fix division by zero in hpet_time_div() (bsc#1051510).\n- hv_netvsc-Set-probe-mode-to-sync.patch: (bsc#1142083).\n- hwmon: (nct6775) Fix register address and added missed tolerance for nct6106 (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992).\n- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- iio: iio-utils: Fix possible incorrect mask calculation (bsc#1051510).\n- Input: alps - do not handle ALPS cs19 trackpoint-only device (bsc#1051510).\n- Input: alps - fix a mismatch between a condition check and its comment (bsc#1051510).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - whitelist Lenovo T580 SMBus intertouch (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: trackpoint - only expose supported controls for Elan, ALPS and NXP (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- intel_th: pci: Add Ice Lake NNPI support (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: do not WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kABI: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kABI: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- KABI: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kvm: arm64: Fix caching of host MDCR_EL2 value (bsc#1133021).\n- kvm: arm/arm64: Close VMID generation race (bsc#1133021).\n- kvm: arm/arm64: Convert kvm_host_cpu_state to a static per-cpu allocation (bsc#1133021).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1133021).\n- kvm: arm/arm64: Fix lost IRQs from emulated physcial timer when blocked (bsc#1133021).\n- kvm: arm/arm64: Fix VMID alloc race by reverting to lock-less (bsc#1133021).\n- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1133021).\n- kvm: arm/arm64: Reduce verbosity of KVM init log (bsc#1133021).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1133021).\n- kvm: arm/arm64: Skip updating PMD entry if no change (bsc#1133021).\n- kvm: arm/arm64: Skip updating PTE entry if no change (bsc#1133021).\n- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1133021).\n- kvm: arm/arm64: vgic: Fix kvm_device leak in vgic_its_destroy (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Fix potential overrun in vgic_copy_lpi_list (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1133021).\n- kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init (bsc#1133021).\n- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: mmu: Fix overlap between public and private memslots (bsc#1133021).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: Reject device ioctls from processes other than the VM\u0027s creator (bsc#1133021).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_KVM_NO_POLL for bsc#1119222\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- libata: do not request sense data on !ZAC ATA devices (bsc#1051510).\n- libata: zpodd: Fix small read overflow in zpodd_get_mech_type() (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- libceph: add osd_req_op_extent_osd_data_bvecs() (bsc#1141450).\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: handle zero-length data items (bsc#1141450).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce BVECS data type (bsc#1141450).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: new bio handling code (aka do not clone bios) (bsc#1141450).\n- libceph: use single request data item for cmp/setxattr (bsc#1139101).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- macsec: fix checksumming after decryption (bsc#1051510).\n- macsec: fix use-after-free of skb during RX (bsc#1051510).\n- macsec: let the administrator set UP state even if lowerdev is down (bsc#1051510).\n- macsec: update operstate when lower device changes (bsc#1051510).\n- mailbox: handle failed named mailbox channel request (bsc#1051510).\n- media: coda: fix last buffer handling in V4L2_ENC_CMD_STOP (bsc#1051510).\n- media: coda: fix mpeg2 sequence number handling (bsc#1051510).\n- media: coda: increment sequence offset for the last returned frame (bsc#1051510).\n- media: coda: Remove unbalanced and unneeded mutex unlock (bsc#1051510).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: dvb: usb: fix use after free in dvb_usb_device_exit (bsc#1051510).\n- media: hdpvr: fix locking and a missing msleep (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: media_device_enum_links32: clean a reserved field (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: spi: IR LED: add missing of table registration (bsc#1051510).\n- media: staging: media: davinci_vpfe: - Fix for memory leak if decoder initialization fails (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- media: vpss: fix a potential NULL pointer dereference (bsc#1051510).\n- media: wl128x: Fix some error handling in fm_v4l2_init_video_device() (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/9p: include trans_common.h to fix missing prototype warning (bsc#1051510).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: remove duplicate fetch in sock_getsockopt (networking-stable-19_07_02).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fixed new system time seconds value calculation (networking-stable-19_07_02).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: stmmac: set IC bit when transmitting frames with HW timestamp (networking-stable-19_07_02).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- nfc: fix potential illegal memory access (bsc#1051510).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: fix possible use-after-free in connect error flow (bsc#1139500)\n- nvme: fix possible use-after-free in connect error flow (bsc#1139500, bsc#1140426)\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- PCI/AER: Use cached AER Capability offset (bsc#1142623).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix panic by calling hv_pci_remove_slots() earlier (bsc#1142701).\n- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).\n- PCI: hv: support reporting serial number as slot information (bsc#1142701).\n- PCI/P2PDMA: Fix missing check for dma_virt_ops (bsc#1111666).\n- PCI / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- PCI/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- PCI/portdrv: Consolidate comments (bsc#1142623).\n- PCI/portdrv: Disable port driver in compat mode (bsc#1142623).\n- PCI/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- PCI: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- PCI/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- PCI/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- PCI: qcom: Ensure that PERST is asserted for at least 100 ms (bsc#1142635).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: xilinx-nwl: Fix Multi MSI data programming (bsc#1142635).\n- pinctrl: pistachio: fix leaked of_node references (bsc#1051510).\n- pinctrl: rockchip: fix leaked of_node references (bsc#1051510).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: ISST: Add common API to register and handle ioctls (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via MSRs (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mailbox interface via PCI (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select mmio interface (jsc#SLE-5364).\n- platform/x86: ISST: Add Intel Speed Select PUNIT MSR interface (jsc#SLE-5364).\n- platform/x86: ISST: Add IOCTL to Translate Linux logical CPU to PUNIT CPU number (jsc#SLE-5364).\n- platform/x86: ISST: Restore state on resume (jsc#SLE-5364).\n- platform/x86: ISST: Store per CPU information (jsc#SLE-5364).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, git-fixes).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test ().\n- powerpc/kdump: Handle crashkernel memory reservation failure (bsc#1143466 LTC#179600).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hash/4k: Do not use 64K page size for vmemmap with 4K pagesize (bsc#1142685 LTC#179509).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/nvdimm: Add an informative message if we fail to allocate altmap block (bsc#1142685 LTC#179509).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm/radix: Use the right page size for vmemmap mapping (bsc#1055117 bsc#1142685 LTC#179509).\n- powerpc/nvdimm: Add support for multibyte read/write for metadata (bsc#1142685 LTC#179509).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/pseries: Fix xive=off command line (bsc#1085030, git-fixes).\n- powerpc/pseries/scm: Mark the region volatile if cache flush not required (bsc#1142685 LTC#179509).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- qed: Fix build error without CONFIG_DEVLINK (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix -Wmaybe-uninitialized false positive (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qlge: Deduplicate lbq_buf_size (bsc#1106061).\n- qlge: Deduplicate rx buffer queue management (bsc#1106061).\n- qlge: Factor out duplicated expression (bsc#1106061).\n- qlge: Fix dma_sync_single calls (bsc#1106061).\n- qlge: Fix irq masking in INTx mode (bsc#1106061).\n- qlge: Refill empty buffer queues from wq (bsc#1106061).\n- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).\n- qlge: Remove bq_desc.maplen (bsc#1106061).\n- qlge: Remove irq_cnt (bsc#1106061).\n- qlge: Remove page_chunk.last_flag (bsc#1106061).\n- qlge: Remove qlge_bq.len \u0026 size (bsc#1106061).\n- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).\n- qlge: Remove rx_ring.type (bsc#1106061).\n- qlge: Remove useless dma synchronization calls (bsc#1106061).\n- qlge: Remove useless memset (bsc#1106061).\n- qlge: Replace memset with assignment (bsc#1106061).\n- qlge: Update buffer queue prod index despite oom (bsc#1106061).\n- rbd: do not (ab)use obj_req-\u003epages for stat requests (bsc#1141450).\n- rbd: do not NULL out -\u003eobj_request in rbd_img_obj_parent_read_full() (bsc#1141450).\n- rbd: get rid of img_req-\u003ecopyup_pages (bsc#1141450).\n- rbd: move from raw pages to bvec data descriptors (bsc#1141450).\n- rbd: remove bio cloning helpers (bsc#1141450).\n- rbd: start enums at 1 instead of 0 (bsc#1141450).\n- rbd: use kmem_cache_zalloc() in rbd_img_request_create() (bsc#1141450).\n- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992).\n- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992).\n- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 ).\n- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992).\n- RDS: IB: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- Refresh patches.drivers/0001-PCI-pciehp-Unify-controller-and-slot-structs.patch. (bsc#1141558)\n- regmap: fix bulk writes on paged registers (bsc#1051510).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995).\n- Revert \u0027serial: 8250: Do not service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390: add alignment hints to vector load and store (jsc#SLE-6907 LTC#175887).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpum_cf: add ctr_stcctm() function (jsc#SLE-6904 ).\n- s390/cpum_cf: Add minimal in-kernel interface for counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for CPU-MF SVN 6 (jsc#SLE-6904 ).\n- s390/cpum_cf_diag: Add support for s390 counter facility diagnostic trace (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_alert() to obtain measurement alerts (jsc#SLE-6904).\n- s390/cpum_cf: introduce kernel_cpumcf_avail() function (jsc#SLE-6904).\n- s390/cpum_cf: move counter set controls to a new header file (jsc#SLE-6904).\n- s390/cpum_cf: prepare for in-kernel counter measurements (jsc#SLE-6904).\n- s390/cpum_cf: rename per-CPU counter facility structure and variables (jsc#SLE-6904).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/cpu_mf: add store cpu counter multiple instruction support (jsc#SLE-6904).\n- s390/cpumf: Fix warning from check_processor_id (jsc#SLE-6904 ).\n- s390/cpu_mf: move struct cpu_cf_events and per-CPU variable to header file (jsc#SLE-6904).\n- s390/cpu_mf: replace stcctm5() with the stcctm() function (jsc#SLE-6904).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142117 bsc#1142118 bsc#1142119 LTC#179329 LTC#179330 LTC#179331).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: report new CPU capabilities (jsc#SLE-6907 LTC#175887).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- scsi: bnx2fc: Fix error handling in probe() (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: fix incorrect cast to u64 on shift operation (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: Fix NULL dereference in error handling (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: Remove set but not used variable \u0027oxid\u0027 (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: remove unneeded variable (bsc#1136502 jsc#SLE-4703).\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- SCSI: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst-\u003eatid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libcxgbi: find cxgbi device by MAC address (bsc#1136352 jsc#SLE-4687).\n- scsi: libcxgbi: remove uninitialized variable len (bsc#1136352 jsc#SLE-4687).\n- scsi: libcxgbi: update route finding logic (bsc#1136352 jsc#SLE-4687)\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: mpt3sas: Determine smp affinity on per HBA basis (bsc#1143738).\n- scsi: mpt3sas: Fix msix load balance on and off settings (bsc#1143738).\n- scsi: mpt3sas: make driver options visible in sys (bsc#1143738).\n- scsi: mpt3sas: Mark expected switch fall-through (bsc#1143738).\n- scsi: mpt3sas: Remove CPU arch check to determine perf_mode (bsc#1143738).\n- scsi: mpt3sas: Use 63-bit DMA addressing on SAS35 HBA (bsc#1143738).\n- scsi: mpt3sas: Use configured PCIe link speed, not max (bsc#1143738).\n- scsi: mpt3sas: use DEVICE_ATTR_{RO, RW} (bsc#1143738).\n- scsi: qedf: Add additional checks for io_req-\u003esc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- sctp: change to hold sk after auth shkey is created successfully (networking-stable-19_07_02).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: 8250: Fix TX interrupt handling condition (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- team: Always enable vlan tx offload (bsc#1051510).\n- tipc: change to use register_pernet_device (networking-stable-19_07_02).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tools/power/x86: A tool to validate Intel Speed Select commands (jsc#SLE-5364).\n- tracing: Fix header include guards in trace event headers (bsc#1144474).\n- tty/ldsem, locking/rwsem: Add missing ACQUIRE to read_failed sleep loop (bsc#1051510).\n- tty: max310x: Fix invalid baudrate divisors calculator (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty/serial: digicolor: Fix digicolor-usart already registered warning (bsc#1051510).\n- tty: serial: msm_serial: avoid system lockup condition (bsc#1051510).\n- tua6100: Avoid build warnings (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- tun: wake up waitqueues after IFF_UP is set (networking-stable-19_07_02).\n- Update patches.arch/powerpc-pseries-Fix-xive-off-command-line.patch (bsc#1085030, bsc#1144518, LTC#178833).\n- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).\n- usb: core: hub: Disable hub-initiated U1/U2 (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: Handle USB3 remote wakeup for LPM enabled devices correctly (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- usb: wusbcore: fix unbalanced get/put cluster_id (bsc#1051510).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 ).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1923", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1923-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1923-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1923-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083710", "url": "https://bugzilla.suse.com/1083710" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1086103", "url": "https://bugzilla.suse.com/1086103" }, { "category": "self", "summary": "SUSE Bug 1102247", "url": "https://bugzilla.suse.com/1102247" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1106061", "url": "https://bugzilla.suse.com/1106061" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1119222", "url": "https://bugzilla.suse.com/1119222" }, { "category": "self", "summary": "SUSE Bug 1123959", "url": "https://bugzilla.suse.com/1123959" }, { "category": "self", "summary": "SUSE Bug 1127034", "url": "https://bugzilla.suse.com/1127034" }, { "category": "self", "summary": "SUSE Bug 1127315", "url": "https://bugzilla.suse.com/1127315" }, { "category": "self", "summary": "SUSE Bug 1127611", "url": "https://bugzilla.suse.com/1127611" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1130972", "url": "https://bugzilla.suse.com/1130972" }, { "category": "self", "summary": "SUSE Bug 1131281", "url": "https://bugzilla.suse.com/1131281" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134090", "url": "https://bugzilla.suse.com/1134090" }, { "category": "self", "summary": "SUSE Bug 1134097", "url": "https://bugzilla.suse.com/1134097" }, { "category": "self", "summary": "SUSE Bug 1134390", "url": "https://bugzilla.suse.com/1134390" }, { "category": "self", "summary": "SUSE Bug 1134399", "url": "https://bugzilla.suse.com/1134399" }, { "category": "self", "summary": "SUSE Bug 1135335", "url": "https://bugzilla.suse.com/1135335" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135897", "url": "https://bugzilla.suse.com/1135897" }, { "category": "self", "summary": "SUSE Bug 1136217", "url": "https://bugzilla.suse.com/1136217" }, { "category": "self", "summary": "SUSE Bug 1136342", "url": "https://bugzilla.suse.com/1136342" }, { "category": "self", "summary": "SUSE Bug 1136352", "url": "https://bugzilla.suse.com/1136352" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1136467", "url": "https://bugzilla.suse.com/1136467" }, { "category": "self", "summary": "SUSE Bug 1136502", "url": "https://bugzilla.suse.com/1136502" }, { "category": "self", "summary": "SUSE Bug 1137458", "url": "https://bugzilla.suse.com/1137458" }, { "category": "self", "summary": "SUSE Bug 1137534", "url": "https://bugzilla.suse.com/1137534" }, { "category": "self", "summary": "SUSE Bug 1137535", "url": "https://bugzilla.suse.com/1137535" }, { "category": "self", "summary": "SUSE Bug 1137584", "url": "https://bugzilla.suse.com/1137584" }, { "category": "self", "summary": "SUSE Bug 1137609", "url": "https://bugzilla.suse.com/1137609" }, { "category": "self", "summary": "SUSE Bug 1137811", "url": "https://bugzilla.suse.com/1137811" }, { "category": "self", "summary": "SUSE Bug 1137827", "url": "https://bugzilla.suse.com/1137827" }, { "category": "self", "summary": "SUSE Bug 1138874", "url": "https://bugzilla.suse.com/1138874" }, { "category": "self", "summary": "SUSE Bug 1139101", "url": "https://bugzilla.suse.com/1139101" }, { "category": "self", "summary": "SUSE Bug 1139358", "url": "https://bugzilla.suse.com/1139358" }, { "category": "self", "summary": "SUSE Bug 1139500", "url": "https://bugzilla.suse.com/1139500" }, { "category": "self", "summary": "SUSE Bug 1139619", "url": "https://bugzilla.suse.com/1139619" }, { "category": "self", "summary": "SUSE Bug 1140133", "url": "https://bugzilla.suse.com/1140133" }, { "category": "self", "summary": "SUSE Bug 1140139", "url": "https://bugzilla.suse.com/1140139" }, { "category": "self", "summary": "SUSE Bug 1140322", "url": "https://bugzilla.suse.com/1140322" }, { "category": "self", "summary": "SUSE Bug 1140426", "url": "https://bugzilla.suse.com/1140426" }, { "category": "self", "summary": "SUSE Bug 1140559", "url": "https://bugzilla.suse.com/1140559" }, { "category": "self", "summary": "SUSE Bug 1140652", "url": "https://bugzilla.suse.com/1140652" }, { "category": "self", "summary": "SUSE Bug 1140676", "url": "https://bugzilla.suse.com/1140676" }, { "category": "self", "summary": "SUSE Bug 1140903", "url": "https://bugzilla.suse.com/1140903" }, { "category": "self", "summary": "SUSE Bug 1140945", "url": "https://bugzilla.suse.com/1140945" }, { "category": "self", "summary": "SUSE Bug 1141312", "url": "https://bugzilla.suse.com/1141312" }, { "category": "self", "summary": "SUSE Bug 1141401", "url": "https://bugzilla.suse.com/1141401" }, { "category": "self", "summary": "SUSE Bug 1141402", "url": "https://bugzilla.suse.com/1141402" }, { "category": "self", "summary": "SUSE Bug 1141450", "url": "https://bugzilla.suse.com/1141450" }, { "category": "self", "summary": "SUSE Bug 1141452", "url": "https://bugzilla.suse.com/1141452" }, { "category": "self", "summary": "SUSE Bug 1141453", "url": "https://bugzilla.suse.com/1141453" }, { "category": "self", "summary": "SUSE Bug 1141454", "url": "https://bugzilla.suse.com/1141454" }, { "category": "self", "summary": "SUSE Bug 1141478", "url": "https://bugzilla.suse.com/1141478" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142023", "url": "https://bugzilla.suse.com/1142023" }, { "category": "self", "summary": "SUSE Bug 1142052", "url": "https://bugzilla.suse.com/1142052" }, { "category": "self", "summary": "SUSE Bug 1142083", "url": "https://bugzilla.suse.com/1142083" }, { "category": "self", "summary": "SUSE Bug 1142112", "url": "https://bugzilla.suse.com/1142112" }, { "category": "self", "summary": "SUSE Bug 1142115", "url": "https://bugzilla.suse.com/1142115" }, { "category": "self", "summary": "SUSE Bug 1142117", "url": "https://bugzilla.suse.com/1142117" }, { "category": "self", "summary": "SUSE Bug 1142118", "url": "https://bugzilla.suse.com/1142118" }, { "category": "self", "summary": "SUSE Bug 1142119", "url": "https://bugzilla.suse.com/1142119" }, { "category": "self", "summary": "SUSE Bug 1142220", "url": "https://bugzilla.suse.com/1142220" }, { "category": "self", "summary": "SUSE Bug 1142221", "url": "https://bugzilla.suse.com/1142221" }, { "category": "self", "summary": "SUSE Bug 1142254", "url": "https://bugzilla.suse.com/1142254" }, { "category": "self", "summary": "SUSE Bug 1142265", "url": "https://bugzilla.suse.com/1142265" }, { "category": "self", "summary": "SUSE Bug 1142350", "url": "https://bugzilla.suse.com/1142350" }, { "category": "self", "summary": "SUSE Bug 1142351", "url": "https://bugzilla.suse.com/1142351" }, { "category": "self", "summary": "SUSE Bug 1142354", "url": "https://bugzilla.suse.com/1142354" }, { "category": "self", "summary": "SUSE Bug 1142359", "url": "https://bugzilla.suse.com/1142359" }, { "category": "self", "summary": "SUSE Bug 1142450", "url": "https://bugzilla.suse.com/1142450" }, { "category": "self", "summary": "SUSE Bug 1142623", "url": "https://bugzilla.suse.com/1142623" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142673", "url": "https://bugzilla.suse.com/1142673" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1142701", "url": "https://bugzilla.suse.com/1142701" }, { "category": "self", "summary": "SUSE Bug 1142857", "url": "https://bugzilla.suse.com/1142857" }, { "category": "self", "summary": "SUSE Bug 1142868", "url": "https://bugzilla.suse.com/1142868" }, { "category": "self", "summary": "SUSE Bug 1143003", "url": "https://bugzilla.suse.com/1143003" }, { "category": "self", "summary": "SUSE Bug 1143045", "url": "https://bugzilla.suse.com/1143045" }, { "category": "self", "summary": "SUSE Bug 1143105", "url": "https://bugzilla.suse.com/1143105" }, { "category": "self", "summary": "SUSE Bug 1143185", "url": "https://bugzilla.suse.com/1143185" }, { "category": "self", "summary": "SUSE Bug 1143189", "url": "https://bugzilla.suse.com/1143189" }, { "category": "self", "summary": "SUSE Bug 1143191", "url": "https://bugzilla.suse.com/1143191" }, { "category": "self", "summary": "SUSE Bug 1143209", "url": "https://bugzilla.suse.com/1143209" }, { "category": "self", "summary": "SUSE Bug 1143466", "url": "https://bugzilla.suse.com/1143466" }, { "category": "self", "summary": "SUSE Bug 1143507", "url": "https://bugzilla.suse.com/1143507" }, { "category": "self", "summary": "SUSE Bug 1143738", "url": "https://bugzilla.suse.com/1143738" }, { "category": "self", "summary": "SUSE Bug 1144474", "url": "https://bugzilla.suse.com/1144474" }, { "category": "self", "summary": "SUSE Bug 1144518", "url": "https://bugzilla.suse.com/1144518" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20855 page", "url": "https://www.suse.com/security/cve/CVE-2018-20855/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1125 page", "url": "https://www.suse.com/security/cve/CVE-2019-1125/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11810 page", "url": "https://www.suse.com/security/cve/CVE-2019-11810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13631 page", "url": "https://www.suse.com/security/cve/CVE-2019-13631/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13648 page", "url": "https://www.suse.com/security/cve/CVE-2019-13648/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14283 page", "url": "https://www.suse.com/security/cve/CVE-2019-14283/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14284 page", "url": "https://www.suse.com/security/cve/CVE-2019-14284/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-08-16T12:21:02Z", "generator": { "date": "2019-08-16T12:21:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1923-1", "initial_release_date": "2019-08-16T12:21:02Z", "revision_history": [ { "date": "2019-08-16T12:21:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.13.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.13.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.13.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.13.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.13.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.13.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.13.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.13.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.13.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.13.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.13.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.13.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.13.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.13.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.13.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.13.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.13.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.13.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20855" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20855", "url": "https://www.suse.com/security/cve/CVE-2018-20855" }, { "category": "external", "summary": "SUSE Bug 1143045 for CVE-2018-20855", "url": "https://bugzilla.suse.com/1143045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "low" } ], "title": "CVE-2018-20855" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-1125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1125" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1125", "url": "https://www.suse.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "SUSE Bug 1139358 for CVE-2019-1125", "url": "https://bugzilla.suse.com/1139358" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "moderate" } ], "title": "CVE-2019-1125" }, { "cve": "CVE-2019-11810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11810" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11810", "url": "https://www.suse.com/security/cve/CVE-2019-11810" }, { "category": "external", "summary": "SUSE Bug 1134399 for CVE-2019-11810", "url": "https://bugzilla.suse.com/1134399" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "low" } ], "title": "CVE-2019-11810" }, { "cve": "CVE-2019-13631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13631" } ], "notes": [ { "category": "general", "text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13631", "url": "https://www.suse.com/security/cve/CVE-2019-13631" }, { "category": "external", "summary": "SUSE Bug 1142023 for CVE-2019-13631", "url": "https://bugzilla.suse.com/1142023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "moderate" } ], "title": "CVE-2019-13631" }, { "cve": "CVE-2019-13648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13648" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13648", "url": "https://www.suse.com/security/cve/CVE-2019-13648" }, { "category": "external", "summary": "SUSE Bug 1142254 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142254" }, { "category": "external", "summary": "SUSE Bug 1142265 for CVE-2019-13648", "url": "https://bugzilla.suse.com/1142265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "low" } ], "title": "CVE-2019-13648" }, { "cve": "CVE-2019-14283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14283" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14283", "url": "https://www.suse.com/security/cve/CVE-2019-14283" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14283", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "moderate" } ], "title": "CVE-2019-14283" }, { "cve": "CVE-2019-14284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14284" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14284", "url": "https://www.suse.com/security/cve/CVE-2019-14284" }, { "category": "external", "summary": "SUSE Bug 1143189 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143189" }, { "category": "external", "summary": "SUSE Bug 1143191 for CVE-2019-14284", "url": "https://bugzilla.suse.com/1143191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.13.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.13.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-16T12:21:02Z", "details": "moderate" } ], "title": "CVE-2019-14284" } ] }
gsd-2019-14284
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-14284", "description": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "id": "GSD-2019-14284", "references": [ "https://www.suse.com/security/cve/CVE-2019-14284.html", "https://www.debian.org/security/2019/dsa-4497", "https://www.debian.org/security/2019/dsa-4495", "https://ubuntu.com/security/CVE-2019-14284", "https://linux.oracle.com/cve/CVE-2019-14284.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-14284" ], "details": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.", "id": "GSD-2019-14284", "modified": "2023-12-13T01:23:52.917702Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "name": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32", "refsource": "MISC", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "DSA-4495", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4495" }, { "name": "20190812 [SECURITY] [DSA 4495-1] linux security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "name": "20190813 [SECURITY] [DSA 4497-1] linux security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "name": "DSA-4497", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4497" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "name": "20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "name": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "openSUSE-SU-2019:1924", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "name": "openSUSE-SU-2019:1923", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "name": "USN-4117-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4114-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4114-1/" }, { "name": "USN-4115-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4116-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4116-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20190905-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "name": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.2.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14284" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-369" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3" }, { "name": "DSA-4495", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2019/dsa-4495" }, { "name": "20190812 [SECURITY] [DSA 4495-1] linux security update", "refsource": "BUGTRAQ", "tags": [], "url": "https://seclists.org/bugtraq/2019/Aug/13" }, { "name": "DSA-4497", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2019/dsa-4497" }, { "name": "20190813 [SECURITY] [DSA 4497-1] linux security update", "refsource": "BUGTRAQ", "tags": [], "url": "https://seclists.org/bugtraq/2019/Aug/18" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html" }, { "name": "20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)", "refsource": "BUGTRAQ", "tags": [], "url": "https://seclists.org/bugtraq/2019/Aug/26" }, { "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" }, { "name": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "openSUSE-SU-2019:1923", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" }, { "name": "openSUSE-SU-2019:1924", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" }, { "name": "USN-4114-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4114-1/" }, { "name": "USN-4117-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4116-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4116-1/" }, { "name": "USN-4115-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4115-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "https://security.netapp.com/advisory/ntap-20190905-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20190905-0002/" }, { "name": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html" }, { "name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 3.6 } }, "lastModifiedDate": "2019-08-11T23:15Z", "publishedDate": "2019-07-26T13:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…